Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5195 (GCVE-0-2016-5195)
Vulnerability from cvelistv5 – Published: 2016-11-10 21:00 – Updated: 2025-11-04 16:09
VLAI?
EPSS
CISA
Summary
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Severity ?
CWE
- n/a
Assigner
References
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2022-03-03
Due date: 2022-03-24
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-5195
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-04T16:09:08.278Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2016:2107",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html"
},
{
"name": "40616",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40616/"
},
{
"name": "RHSA-2017:0372",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bto.bluecoat.com/security-advisory/sa134"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "40839",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40839/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://dirtycow.ninja"
},
{
"name": "40847",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40847/"
},
{
"name": "RHSA-2016:2118",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html"
},
{
"name": "RHSA-2016:2128",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://source.android.com/security/bulletin/2016-12-01.html"
},
{
"name": "RHSA-2016:2120",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html"
},
{
"name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/26/7"
},
{
"name": "RHSA-2016:2133",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html"
},
{
"name": "RHSA-2016:2098",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us"
},
{
"name": "VU#243144",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/243144"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418"
},
{
"name": "1037078",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1037078"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20161025-0001/"
},
{
"name": "93793",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/93793"
},
{
"name": "RHSA-2016:2127",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2016-5195"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"name": "RHSA-2016:2106",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"name": "40611",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40611/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2016-5195"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
},
{
"name": "RHSA-2016:2124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"
},
{
"name": "RHSA-2016:2105",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html"
},
{
"name": "RHSA-2016:2126",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html"
},
{
"name": "RHSA-2016:2132",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html"
},
{
"name": "RHSA-2016:2110",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176"
},
{
"name": "SUSE-SU-2016:2635",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
},
{
"name": "SUSE-SU-2016:2659",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
},
{
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
},
{
"name": "USN-3106-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3106-2"
},
{
"name": "openSUSE-SU-2016:2583",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
},
{
"name": "SUSE-SU-2016:2633",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
},
{
"name": "SUSE-SU-2016:2638",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
},
{
"name": "openSUSE-SU-2016:2584",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
},
{
"name": "SUSE-SU-2016:2658",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
},
{
"name": "SUSE-SU-2016:2631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
},
{
"name": "USN-3106-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3106-3"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241"
},
{
"name": "SUSE-SU-2016:2655",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
},
{
"name": "FEDORA-2016-c3558808cd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2637",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
},
{
"name": "SUSE-SU-2016:2596",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
},
{
"name": "SUSE-SU-2016:2634",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
},
{
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
},
{
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177"
},
{
"name": "SUSE-SU-2016:2657",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
},
{
"name": "SUSE-SU-2016:2614",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
},
{
"name": "USN-3105-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3105-2"
},
{
"name": "USN-3107-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3107-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774"
},
{
"name": "USN-3107-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3107-2"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
},
{
"name": "openSUSE-SU-2016:2625",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
},
{
"name": "USN-3106-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3106-1"
},
{
"name": "USN-3106-4",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3106-4"
},
{
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2673",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
},
{
"name": "USN-3104-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3104-2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807"
},
{
"name": "SUSE-SU-2016:2629",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2632",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
},
{
"name": "USN-3105-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3105-1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
},
{
"name": "SUSE-SU-2016:2630",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
},
{
"name": "FEDORA-2016-db4b75b352",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
},
{
"name": "FEDORA-2016-c8a0c7eece",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
},
{
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
},
{
"name": "SUSE-SU-2016:2636",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
},
{
"name": "SUSE-SU-2016:3069",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222"
},
{
"name": "DSA-3696",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2016/dsa-3696"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
},
{
"name": "SUSE-SU-2016:2592",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
},
{
"name": "USN-3104-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-3104-1"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2593",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
},
{
"name": "SUSE-SU-2016:3304",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
},
{
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2585",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
},
{
"name": "openSUSE-SU-2016:2649",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.paloaltonetworks.com/CVE-2016-5195"
},
{
"name": "openSUSE-SU-2020:0554",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
},
{
"name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/07/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/2"
},
{
"name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/7"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/8"
},
{
"name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/09/4"
},
{
"name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/15/1"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Aug/35"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2016-5195",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T17:18:38.253279Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-03-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-362",
"description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:55:48.198Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-03-03T00:00:00+00:00",
"value": "CVE-2016-5195 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-10-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-15T11:06:10.000Z",
"orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"shortName": "Chrome"
},
"references": [
{
"name": "RHSA-2016:2107",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html"
},
{
"name": "40616",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40616/"
},
{
"name": "RHSA-2017:0372",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bto.bluecoat.com/security-advisory/sa134"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "40839",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40839/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://dirtycow.ninja"
},
{
"name": "40847",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40847/"
},
{
"name": "RHSA-2016:2118",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html"
},
{
"name": "RHSA-2016:2128",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://source.android.com/security/bulletin/2016-12-01.html"
},
{
"name": "RHSA-2016:2120",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html"
},
{
"name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/26/7"
},
{
"name": "RHSA-2016:2133",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html"
},
{
"name": "RHSA-2016:2098",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us"
},
{
"name": "VU#243144",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/243144"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418"
},
{
"name": "1037078",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1037078"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20161025-0001/"
},
{
"name": "93793",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/93793"
},
{
"name": "RHSA-2016:2127",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2016-5195"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"name": "RHSA-2016:2106",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"name": "40611",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40611/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/security/cve/cve-2016-5195"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
},
{
"name": "RHSA-2016:2124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"
},
{
"name": "RHSA-2016:2105",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html"
},
{
"name": "RHSA-2016:2126",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html"
},
{
"name": "RHSA-2016:2132",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html"
},
{
"name": "RHSA-2016:2110",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176"
},
{
"name": "SUSE-SU-2016:2635",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
},
{
"name": "SUSE-SU-2016:2659",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
},
{
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
},
{
"name": "USN-3106-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3106-2"
},
{
"name": "openSUSE-SU-2016:2583",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
},
{
"name": "SUSE-SU-2016:2633",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
},
{
"name": "SUSE-SU-2016:2638",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
},
{
"name": "openSUSE-SU-2016:2584",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
},
{
"name": "SUSE-SU-2016:2658",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
},
{
"name": "SUSE-SU-2016:2631",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
},
{
"name": "USN-3106-3",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3106-3"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241"
},
{
"name": "SUSE-SU-2016:2655",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
},
{
"name": "FEDORA-2016-c3558808cd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2637",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
},
{
"name": "SUSE-SU-2016:2596",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
},
{
"name": "SUSE-SU-2016:2634",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
},
{
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
},
{
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177"
},
{
"name": "SUSE-SU-2016:2657",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
},
{
"name": "SUSE-SU-2016:2614",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
},
{
"name": "USN-3105-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3105-2"
},
{
"name": "USN-3107-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3107-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774"
},
{
"name": "USN-3107-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3107-2"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
},
{
"name": "openSUSE-SU-2016:2625",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
},
{
"name": "USN-3106-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3106-1"
},
{
"name": "USN-3106-4",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3106-4"
},
{
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2673",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
},
{
"name": "USN-3104-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3104-2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807"
},
{
"name": "SUSE-SU-2016:2629",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2632",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
},
{
"name": "USN-3105-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3105-1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
},
{
"name": "SUSE-SU-2016:2630",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
},
{
"name": "FEDORA-2016-db4b75b352",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
},
{
"name": "FEDORA-2016-c8a0c7eece",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
},
{
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
},
{
"name": "SUSE-SU-2016:2636",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
},
{
"name": "SUSE-SU-2016:3069",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222"
},
{
"name": "DSA-3696",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2016/dsa-3696"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
},
{
"name": "SUSE-SU-2016:2592",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
},
{
"name": "USN-3104-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-3104-1"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2593",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
},
{
"name": "SUSE-SU-2016:3304",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
},
{
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2585",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
},
{
"name": "openSUSE-SU-2016:2649",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.paloaltonetworks.com/CVE-2016-5195"
},
{
"name": "openSUSE-SU-2020:0554",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
},
{
"name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/03/07/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/2"
},
{
"name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/7"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/8"
},
{
"name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/09/4"
},
{
"name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/15/1"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "chrome-cve-admin@google.com",
"ID": "CVE-2016-5195",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2016:2107",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html"
},
{
"name": "40616",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40616/"
},
{
"name": "RHSA-2017:0372",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"name": "https://bto.bluecoat.com/security-advisory/sa134",
"refsource": "CONFIRM",
"url": "https://bto.bluecoat.com/security-advisory/sa134"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241"
},
{
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
},
{
"name": "40839",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40839/"
},
{
"name": "https://dirtycow.ninja",
"refsource": "MISC",
"url": "https://dirtycow.ninja"
},
{
"name": "40847",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40847/"
},
{
"name": "RHSA-2016:2118",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html"
},
{
"name": "RHSA-2016:2128",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html"
},
{
"name": "https://source.android.com/security/bulletin/2016-12-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2016-12-01.html"
},
{
"name": "RHSA-2016:2120",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html"
},
{
"name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/26/7"
},
{
"name": "RHSA-2016:2133",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html"
},
{
"name": "RHSA-2016:2098",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us"
},
{
"name": "VU#243144",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/243144"
},
{
"name": "https://bugzilla.suse.com/show_bug.cgi?id=1004418",
"refsource": "CONFIRM",
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418"
},
{
"name": "1037078",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1037078"
},
{
"name": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html",
"refsource": "CONFIRM",
"url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us"
},
{
"name": "https://security.netapp.com/advisory/ntap-20161025-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20161025-0001/"
},
{
"name": "93793",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93793"
},
{
"name": "RHSA-2016:2127",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2016-5195",
"refsource": "CONFIRM",
"url": "https://security-tracker.debian.org/tracker/CVE-2016-5195"
},
{
"name": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs",
"refsource": "MISC",
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us"
},
{
"name": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"refsource": "CONFIRM",
"url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails",
"refsource": "MISC",
"url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"name": "https://access.redhat.com/security/vulnerabilities/2706661",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"name": "RHSA-2016:2106",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html"
},
{
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619",
"refsource": "CONFIRM",
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619"
},
{
"name": "40611",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40611/"
},
{
"name": "https://access.redhat.com/security/cve/cve-2016-5195",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/cve/cve-2016-5195"
},
{
"name": "https://source.android.com/security/bulletin/2016-11-01.html",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/2016-11-01.html"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541"
},
{
"name": "RHSA-2016:2124",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3"
},
{
"name": "RHSA-2016:2105",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html"
},
{
"name": "RHSA-2016:2126",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html"
},
{
"name": "RHSA-2016:2132",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html"
},
{
"name": "RHSA-2016:2110",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us"
},
{
"name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176"
},
{
"name": "SUSE-SU-2016:2635",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html"
},
{
"name": "SUSE-SU-2016:2659",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html"
},
{
"name": "[oss-security] 20161027 CVE-2016-5195 test case",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/27/13"
},
{
"name": "USN-3106-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3106-2"
},
{
"name": "openSUSE-SU-2016:2583",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html"
},
{
"name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html"
},
{
"name": "SUSE-SU-2016:2633",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en"
},
{
"name": "SUSE-SU-2016:2638",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html"
},
{
"name": "openSUSE-SU-2016:2584",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html"
},
{
"name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html"
},
{
"name": "SUSE-SU-2016:2658",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html"
},
{
"name": "SUSE-SU-2016:2631",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html"
},
{
"name": "USN-3106-3",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3106-3"
},
{
"name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241",
"refsource": "CONFIRM",
"url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241"
},
{
"name": "SUSE-SU-2016:2655",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html"
},
{
"name": "FEDORA-2016-c3558808cd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2637",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html"
},
{
"name": "SUSE-SU-2016:2596",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html"
},
{
"name": "SUSE-SU-2016:2634",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html"
},
{
"name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd"
},
{
"name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177"
},
{
"name": "SUSE-SU-2016:2657",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html"
},
{
"name": "SUSE-SU-2016:2614",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html"
},
{
"name": "USN-3105-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3105-2"
},
{
"name": "USN-3107-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3107-1"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774"
},
{
"name": "USN-3107-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3107-2"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded"
},
{
"name": "openSUSE-SU-2016:2625",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html"
},
{
"name": "USN-3106-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3106-1"
},
{
"name": "USN-3106-4",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3106-4"
},
{
"name": "[oss-security] 20161030 Re: CVE-2016-5195 test case",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/30/1"
},
{
"name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2673",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html"
},
{
"name": "USN-3104-2",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3104-2"
},
{
"name": "http://fortiguard.com/advisory/FG-IR-16-063",
"refsource": "CONFIRM",
"url": "http://fortiguard.com/advisory/FG-IR-16-063"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807"
},
{
"name": "SUSE-SU-2016:2629",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded"
},
{
"name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html"
},
{
"name": "SUSE-SU-2016:2632",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded"
},
{
"name": "USN-3105-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3105-1"
},
{
"name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html"
},
{
"name": "SUSE-SU-2016:2630",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html"
},
{
"name": "FEDORA-2016-db4b75b352",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/"
},
{
"name": "FEDORA-2016-c8a0c7eece",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/"
},
{
"name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/11/03/7"
},
{
"name": "SUSE-SU-2016:2636",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html"
},
{
"name": "SUSE-SU-2016:3069",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222"
},
{
"name": "DSA-3696",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2016/dsa-3696"
},
{
"name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html"
},
{
"name": "SUSE-SU-2016:2592",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html"
},
{
"name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded"
},
{
"name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded"
},
{
"name": "USN-3104-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-3104-1"
},
{
"name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2593",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html"
},
{
"name": "SUSE-SU-2016:3304",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html"
},
{
"name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2016/10/21/1"
},
{
"name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded"
},
{
"name": "SUSE-SU-2016:2585",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html"
},
{
"name": "openSUSE-SU-2016:2649",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html"
},
{
"name": "https://security.paloaltonetworks.com/CVE-2016-5195",
"refsource": "CONFIRM",
"url": "https://security.paloaltonetworks.com/CVE-2016-5195"
},
{
"name": "openSUSE-SU-2020:0554",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html"
},
{
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026",
"refsource": "MISC",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026"
},
{
"name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/03/07/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/2"
},
{
"name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/1"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/7"
},
{
"name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/08/8"
},
{
"name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/09/4"
},
{
"name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/08/15/1"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28",
"assignerShortName": "Chrome",
"cveId": "CVE-2016-5195",
"datePublished": "2016-11-10T21:00:00.000Z",
"dateReserved": "2016-05-31T00:00:00.000Z",
"dateUpdated": "2025-11-04T16:09:08.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2016-5195",
"cwes": "[\"CWE-362\"]",
"dateAdded": "2022-03-03",
"dueDate": "2022-03-24",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"product": "Kernel",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.",
"vendorProject": "Linux",
"vulnerabilityName": "Linux Kernel Race Condition Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2022-03-24",
"cisaExploitAdd": "2022-03-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Linux Kernel Race Condition Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\", \"matchCriteriaId\": \"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AFB20FA-CB00-4729-AB3A-816454C6D096\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.6.22\", \"versionEndExcluding\": \"3.2.83\", \"matchCriteriaId\": \"6C039170-F1A6-48B9-8A16-AEBFD9924804\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.3\", \"versionEndExcluding\": \"3.4.113\", \"matchCriteriaId\": \"9A93F019-B0C0-4723-869E-C715F15E11C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.5\", \"versionEndExcluding\": \"3.10.104\", \"matchCriteriaId\": \"B3B44636-A1EC-47C9-BE92-BC761CBB1B7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.11\", \"versionEndExcluding\": \"3.12.66\", \"matchCriteriaId\": \"1E7C6515-C636-45C4-9766-BA26B89F1424\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.13\", \"versionEndExcluding\": \"3.16.38\", \"matchCriteriaId\": \"8B1131A4-6EEF-4A1F-B706-1A61A471D632\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.17\", \"versionEndExcluding\": \"3.18.44\", \"matchCriteriaId\": \"EBC11DAF-1AA0-4B60-A20C-6276BDBF3BC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"3.19\", \"versionEndExcluding\": \"4.1.35\", \"matchCriteriaId\": \"98821D4F-193B-44AB-8AA9-6F767F25F5E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.2\", \"versionEndExcluding\": \"4.4.26\", \"matchCriteriaId\": \"905253FB-85D4-4961-8C57-5A1B36741C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.5\", \"versionEndExcluding\": \"4.7.9\", \"matchCriteriaId\": \"72401FBF-CEB9-47FD-BAC0-EFC49B634BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.8\", \"versionEndExcluding\": \"4.8.3\", \"matchCriteriaId\": \"0F5B9915-B0CF-4BDA-A889-14834175FDE0\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D68FB2BB-D103-4CA6-A51E-83DB349DDDE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"512237D6-2B4B-4057-8F7C-F11639304028\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79191794-6151-46E9-AAFD-3EC0C05B03B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"967EC28A-607F-48F4-AD64-5E3041C768F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67A7B7A-998D-4B8C-8831-6E58406565FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84A82ED6-976A-43F1-8820-F5DCB9DDABD9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DBE05B8-17F9-4CC7-9579-1C1D57FEFD9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F4DE47C-0A23-4BCE-BCA1-425F7C1450E5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C729D5D1-ED95-443A-9F53-5D7C2FD9B80C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"772E9557-A371-4664-AE2D-4135AAEB89AA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.1\", \"versionEndExcluding\": \"7.0.14\", \"matchCriteriaId\": \"EA10748B-5F96-4A9B-B673-8E7C87F852D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"7.1.0\", \"versionEndExcluding\": \"7.1.8\", \"matchCriteriaId\": \"214A410F-7160-4E3A-BCCE-378FF0D962EA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"855D6A52-F96F-4CA0-A59C-4D42173F22E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"212E1878-1B9A-4CB4-A1CE-EAD60B867161\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"392D82A3-21BC-4CE1-A0AC-62A90468F0A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F74F467A-0C81-40D9-BA06-40FB8EF02C04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"}, {\"lang\": \"es\", \"value\": \"La condici\\u00f3n de carrera en mm / gup.c en el kernel de Linux 2.x a 4.x antes de 4.8.3 permite a los usuarios locales obtener privilegios aprovechando el manejo incorrecto de una funci\\u00f3n copy-on-write (COW) para escribir en un read- only la cartograf\\u00eda de la memoria, como explotados en la naturaleza en octubre de 2016, vulnerabilidad tambi\\u00e9n conocida como \\\"Dirty COW\\\".\"}]",
"id": "CVE-2016-5195",
"lastModified": "2024-11-21T02:53:48.837",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.0, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-11-10T21:59:00.197",
"references": "[{\"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3696\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/93793\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037078\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3104-1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3104-2\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3105-1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3105-2\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-2\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-3\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-4\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3107-1\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3107-2\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bto.bluecoat.com/security-advisory/sa134\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://dirtycow.ninja\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40611/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40616/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40839/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40847/\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/243144\", \"source\": \"chrome-cve-admin@google.com\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.debian.org/security/2016/dsa-3696\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/93793\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1037078\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3104-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3104-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3105-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3105-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3106-4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3107-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-3107-2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bto.bluecoat.com/security-advisory/sa134\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\", \"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Issue Tracking\"]}, {\"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\"]}, {\"url\": \"https://dirtycow.ninja\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Third Party Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40611/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40616/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40839/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40847/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.kb.cert.org/vuls/id/243144\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "chrome-cve-admin@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-5195\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2016-11-10T21:59:00.197\",\"lastModified\":\"2025-11-04T16:15:37.070\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"},{\"lang\":\"es\",\"value\":\"La condici\u00f3n de carrera en mm / gup.c en el kernel de Linux 2.x a 4.x antes de 4.8.3 permite a los usuarios locales obtener privilegios aprovechando el manejo incorrecto de una funci\u00f3n copy-on-write (COW) para escribir en un read- only la cartograf\u00eda de la memoria, como explotados en la naturaleza en octubre de 2016, vulnerabilidad tambi\u00e9n conocida como \\\"Dirty COW\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-03-03\",\"cisaActionDue\":\"2022-03-24\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Linux Kernel Race Condition Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFB20FA-CB00-4729-AB3A-816454C6D096\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.22\",\"versionEndExcluding\":\"3.2.83\",\"matchCriteriaId\":\"6C039170-F1A6-48B9-8A16-AEBFD9924804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.4.113\",\"matchCriteriaId\":\"9A93F019-B0C0-4723-869E-C715F15E11C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5\",\"versionEndExcluding\":\"3.10.104\",\"matchCriteriaId\":\"B3B44636-A1EC-47C9-BE92-BC761CBB1B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.66\",\"matchCriteriaId\":\"1E7C6515-C636-45C4-9766-BA26B89F1424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.16.38\",\"matchCriteriaId\":\"8B1131A4-6EEF-4A1F-B706-1A61A471D632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.44\",\"matchCriteriaId\":\"EBC11DAF-1AA0-4B60-A20C-6276BDBF3BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.1.35\",\"matchCriteriaId\":\"98821D4F-193B-44AB-8AA9-6F767F25F5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.26\",\"matchCriteriaId\":\"905253FB-85D4-4961-8C57-5A1B36741C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.7.9\",\"matchCriteriaId\":\"72401FBF-CEB9-47FD-BAC0-EFC49B634BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8\",\"versionEndExcluding\":\"4.8.3\",\"matchCriteriaId\":\"0F5B9915-B0CF-4BDA-A889-14834175FDE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68FB2BB-D103-4CA6-A51E-83DB349DDDE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512237D6-2B4B-4057-8F7C-F11639304028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79191794-6151-46E9-AAFD-3EC0C05B03B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967EC28A-607F-48F4-AD64-5E3041C768F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67A7B7A-998D-4B8C-8831-6E58406565FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A82ED6-976A-43F1-8820-F5DCB9DDABD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBE05B8-17F9-4CC7-9579-1C1D57FEFD9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4DE47C-0A23-4BCE-BCA1-425F7C1450E5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C729D5D1-ED95-443A-9F53-5D7C2FD9B80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772E9557-A371-4664-AE2D-4135AAEB89AA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1\",\"versionEndExcluding\":\"7.0.14\",\"matchCriteriaId\":\"EA10748B-5F96-4A9B-B673-8E7C87F852D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.1.0\",\"versionEndExcluding\":\"7.1.8\",\"matchCriteriaId\":\"214A410F-7160-4E3A-BCCE-378FF0D962EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855D6A52-F96F-4CA0-A59C-4D42173F22E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212E1878-1B9A-4CB4-A1CE-EAD60B867161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392D82A3-21BC-4CE1-A0AC-62A90468F0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F74F467A-0C81-40D9-BA06-40FB8EF02C04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/advisory/FG-IR-16-063\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2098.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2105.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2106.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2107.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2110.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2118.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2120.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2126.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2127.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2128.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2132.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2133.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3696\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/21/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/26/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/13\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/30/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/03/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/07/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/8\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/09/4\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/15/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/539611/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540252/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540344/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540736/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/93793\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037078\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-3\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-4\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0372\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2706661\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1004418\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://dirtycow.ninja\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20161025-0001/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-12-01.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40611/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40616/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40839/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40847/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/243144\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://fortiguard.com/advisory/FG-IR-16-063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2105.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2106.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2107.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2110.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2120.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2126.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2127.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2128.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2132.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2133.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Aug/35\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/21/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/26/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/30/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/09/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/539611/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540252/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540344/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540736/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/93793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2706661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1004418\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://dirtycow.ninja\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20161025-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-12-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40611/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40616/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40839/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40847/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/243144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"affected\": [{\"product\": \"n/a\", \"vendor\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-10-20T00:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"n/a\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-08-15T11:06:10.000Z\", \"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\"}, \"references\": [{\"name\": \"RHSA-2016:2107\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"], \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"], \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"], \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"], \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"], \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"chrome-cve-admin@google.com\", \"ID\": \"CVE-2016-5195\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"n/a\", \"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}}]}, \"vendor_name\": \"n/a\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"RHSA-2016:2107\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"refsource\": \"REDHAT\", \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"name\": \"https://bto.bluecoat.com/security-advisory/sa134\", \"refsource\": \"CONFIRM\", \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"name\": \"https://dirtycow.ninja\", \"refsource\": \"MISC\", \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"name\": \"https://source.android.com/security/bulletin/2016-12-01.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"refsource\": \"CERT-VN\", \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"name\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\", \"refsource\": \"CONFIRM\", \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"refsource\": \"SECTRACK\", \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"name\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"name\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"refsource\": \"BID\", \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"name\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"name\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\", \"refsource\": \"MISC\", \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"name\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"refsource\": \"CONFIRM\", \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"refsource\": \"CONFIRM\", \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"name\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\", \"refsource\": \"MISC\", \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"name\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\", \"refsource\": \"CONFIRM\", \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"name\": \"https://access.redhat.com/security/vulnerabilities/2706661\", \"refsource\": \"CONFIRM\", \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"name\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"refsource\": \"CONFIRM\", \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"name\": \"https://access.redhat.com/security/cve/cve-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"name\": \"https://source.android.com/security/bulletin/2016-11-01.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"name\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"name\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"name\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"name\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"refsource\": \"CISCO\", \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"refsource\": \"CISCO\", \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"name\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"name\": \"http://fortiguard.com/advisory/FG-IR-16-063\", \"refsource\": \"CONFIRM\", \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"name\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"name\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"refsource\": \"DEBIAN\", \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"name\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"name\": \"https://security.paloaltonetworks.com/CVE-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"name\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\", \"refsource\": \"MISC\", \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T00:53:48.930Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"RHSA-2016:2107\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"], \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"], \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"], \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"], \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-5195\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T17:18:38.253279Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-03-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2016-5195\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T17:16:53.765Z\"}}]}",
"cveMetadata": "{\"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"assignerShortName\": \"Chrome\", \"cveId\": \"CVE-2016-5195\", \"datePublished\": \"2016-11-10T21:00:00.000Z\", \"dateReserved\": \"2016-05-31T00:00:00.000Z\", \"dateUpdated\": \"2025-01-29T17:18:43.067Z\", \"state\": \"PUBLISHED\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2016:2673-1
Vulnerability from csaf_suse - Published: 2016-10-31 06:43 - Updated: 2016-10-31 06:43Summary
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_62 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.62-60_62 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1574",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2673-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2673-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162673-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2673-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002376.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001486",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-31T06:43:05Z",
"generator": {
"date": "2016-10-31T06:43:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2673-1",
"initial_release_date": "2016-10-31T06:43:05Z",
"revision_history": [
{
"date": "2016-10-31T06:43:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"product_id": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64",
"product_id": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-31T06:43:05Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-31T06:43:05Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2592-1
Vulnerability from csaf_suse - Published: 2016-10-21 13:16 - Updated: 2016-10-21 13:16Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1522,SUSE-SLE-Live-Patching-12-2016-1522,SUSE-SLE-Module-Public-Cloud-12-2016-1522,SUSE-SLE-SDK-12-SP1-2016-1522,SUSE-SLE-SERVER-12-SP1-2016-1522,SUSE-SLE-WE-12-SP1-2016-1522
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n\nThis non-security bug was fixed:\n\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP1-2016-1522,SUSE-SLE-Live-Patching-12-2016-1522,SUSE-SLE-Module-Public-Cloud-12-2016-1522,SUSE-SLE-SDK-12-SP1-2016-1522,SUSE-SLE-SERVER-12-SP1-2016-1522,SUSE-SLE-WE-12-SP1-2016-1522",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2592-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2592-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162592-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2592-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002345.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001419",
"url": "https://bugzilla.suse.com/1001419"
},
{
"category": "self",
"summary": "SUSE Bug 1002165",
"url": "https://bugzilla.suse.com/1002165"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE Bug 904970",
"url": "https://bugzilla.suse.com/904970"
},
{
"category": "self",
"summary": "SUSE Bug 907150",
"url": "https://bugzilla.suse.com/907150"
},
{
"category": "self",
"summary": "SUSE Bug 920615",
"url": "https://bugzilla.suse.com/920615"
},
{
"category": "self",
"summary": "SUSE Bug 920633",
"url": "https://bugzilla.suse.com/920633"
},
{
"category": "self",
"summary": "SUSE Bug 930408",
"url": "https://bugzilla.suse.com/930408"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-10-21T13:16:53Z",
"generator": {
"date": "2016-10-21T13:16:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2592-1",
"initial_release_date": "2016-10-21T13:16:53Z",
"revision_history": [
{
"date": "2016-10-21T13:16:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.62-60.64.8.2.noarch",
"product": {
"name": "kernel-devel-3.12.62-60.64.8.2.noarch",
"product_id": "kernel-devel-3.12.62-60.64.8.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.62-60.64.8.2.noarch",
"product": {
"name": "kernel-macros-3.12.62-60.64.8.2.noarch",
"product_id": "kernel-macros-3.12.62-60.64.8.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.62-60.64.8.2.noarch",
"product": {
"name": "kernel-source-3.12.62-60.64.8.2.noarch",
"product_id": "kernel-source-3.12.62-60.64.8.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.62-60.64.8.5.noarch",
"product": {
"name": "kernel-docs-3.12.62-60.64.8.5.noarch",
"product_id": "kernel-docs-3.12.62-60.64.8.5.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"product_id": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.62-60.64.8.2.ppc64le",
"product": {
"name": "kernel-default-3.12.62-60.64.8.2.ppc64le",
"product_id": "kernel-default-3.12.62-60.64.8.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"product": {
"name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"product_id": "kernel-default-base-3.12.62-60.64.8.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"product_id": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.62-60.64.8.2.ppc64le",
"product": {
"name": "kernel-syms-3.12.62-60.64.8.2.ppc64le",
"product_id": "kernel-syms-3.12.62-60.64.8.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-obs-build-3.12.62-60.64.8.3.s390x",
"product": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.s390x",
"product_id": "kernel-obs-build-3.12.62-60.64.8.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.62-60.64.8.2.s390x",
"product": {
"name": "kernel-default-3.12.62-60.64.8.2.s390x",
"product_id": "kernel-default-3.12.62-60.64.8.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.62-60.64.8.2.s390x",
"product": {
"name": "kernel-default-base-3.12.62-60.64.8.2.s390x",
"product_id": "kernel-default-base-3.12.62-60.64.8.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.62-60.64.8.2.s390x",
"product": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.s390x",
"product_id": "kernel-default-devel-3.12.62-60.64.8.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.62-60.64.8.2.s390x",
"product": {
"name": "kernel-default-man-3.12.62-60.64.8.2.s390x",
"product_id": "kernel-default-man-3.12.62-60.64.8.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.62-60.64.8.2.s390x",
"product": {
"name": "kernel-syms-3.12.62-60.64.8.2.s390x",
"product_id": "kernel-syms-3.12.62-60.64.8.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-default-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-default-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-default-devel-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-default-extra-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-syms-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-syms-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-xen-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-xen-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"product": {
"name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"product_id": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"product": {
"name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"product_id": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-ec2-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-ec2-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"product": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"product_id": "kernel-obs-build-3.12.62-60.64.8.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-default-base-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-default-base-3.12.62-60.64.8.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"product": {
"name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"product_id": "kernel-xen-base-3.12.62-60.64.8.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-source-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1",
"product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64"
},
"product_reference": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64"
},
"product_reference": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-ec2-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.12.62-60.64.8.5.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch"
},
"product_reference": "kernel-docs-3.12.62-60.64.8.5.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le"
},
"product_reference": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x"
},
"product_reference": "kernel-obs-build-3.12.62-60.64.8.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64"
},
"product_reference": "kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-man-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-source-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1",
"product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-base-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-default-man-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch"
},
"product_reference": "kernel-source-3.12.62-60.64.8.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64"
},
"product_reference": "kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T13:16:53Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2636-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:19 - Updated: 2016-10-25 21:19Summary
Security update for Linux Kernel Live Patch 9 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 9 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.51-52_31 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2636-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2636-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162636-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2636-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002360.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE Bug 986377",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 9 for SLE 12",
"tracking": {
"current_release_date": "2016-10-25T21:19:25Z",
"generator": {
"date": "2016-10-25T21:19:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2636-1",
"initial_release_date": "2016-10-25T21:19:25Z",
"revision_history": [
{
"date": "2016-10-25T21:19:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:25Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:25Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2585-1
Vulnerability from csaf_suse - Published: 2016-10-21 11:53 - Updated: 2016-10-21 11:53Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
sdksp4-kernel-source-12804,slessp4-kernel-source-12804,slexsp3-kernel-source-12804
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-kernel-source-12804,slessp4-kernel-source-12804,slexsp3-kernel-source-12804",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2585-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2585-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162585-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2585-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002343.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-10-21T11:53:13Z",
"generator": {
"date": "2016-10-21T11:53:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2585-1",
"initial_release_date": "2016-10-21T11:53:13Z",
"revision_history": [
{
"date": "2016-10-21T11:53:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-84.1.i586",
"product": {
"name": "kernel-default-3.0.101-84.1.i586",
"product_id": "kernel-default-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-84.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-84.1.i586",
"product_id": "kernel-default-base-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-84.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-84.1.i586",
"product_id": "kernel-default-devel-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-84.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-84.1.i586",
"product_id": "kernel-ec2-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-84.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-84.1.i586",
"product_id": "kernel-ec2-base-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-84.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-84.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-84.1.i586",
"product": {
"name": "kernel-pae-3.0.101-84.1.i586",
"product_id": "kernel-pae-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-84.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-84.1.i586",
"product_id": "kernel-pae-base-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-84.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-84.1.i586",
"product_id": "kernel-pae-devel-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-84.1.i586",
"product": {
"name": "kernel-source-3.0.101-84.1.i586",
"product_id": "kernel-source-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-84.1.i586",
"product": {
"name": "kernel-syms-3.0.101-84.1.i586",
"product_id": "kernel-syms-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-84.1.i586",
"product": {
"name": "kernel-trace-3.0.101-84.1.i586",
"product_id": "kernel-trace-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-84.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-84.1.i586",
"product_id": "kernel-trace-base-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-84.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-84.1.i586",
"product_id": "kernel-trace-devel-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-84.1.i586",
"product": {
"name": "kernel-xen-3.0.101-84.1.i586",
"product_id": "kernel-xen-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-84.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-84.1.i586",
"product_id": "kernel-xen-base-3.0.101-84.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-84.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-84.1.i586",
"product_id": "kernel-xen-devel-3.0.101-84.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-84.1.ia64",
"product": {
"name": "kernel-default-3.0.101-84.1.ia64",
"product_id": "kernel-default-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-84.1.ia64",
"product": {
"name": "kernel-default-base-3.0.101-84.1.ia64",
"product_id": "kernel-default-base-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-84.1.ia64",
"product": {
"name": "kernel-default-devel-3.0.101-84.1.ia64",
"product_id": "kernel-default-devel-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-84.1.ia64",
"product": {
"name": "kernel-source-3.0.101-84.1.ia64",
"product_id": "kernel-source-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-84.1.ia64",
"product": {
"name": "kernel-syms-3.0.101-84.1.ia64",
"product_id": "kernel-syms-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-84.1.ia64",
"product": {
"name": "kernel-trace-3.0.101-84.1.ia64",
"product_id": "kernel-trace-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-84.1.ia64",
"product": {
"name": "kernel-trace-base-3.0.101-84.1.ia64",
"product_id": "kernel-trace-base-3.0.101-84.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-84.1.ia64",
"product": {
"name": "kernel-trace-devel-3.0.101-84.1.ia64",
"product_id": "kernel-trace-devel-3.0.101-84.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-84.2.noarch",
"product": {
"name": "kernel-docs-3.0.101-84.2.noarch",
"product_id": "kernel-docs-3.0.101-84.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-84.1.ppc64",
"product_id": "kernel-default-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-84.1.ppc64",
"product_id": "kernel-default-base-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-84.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-84.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-84.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-84.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-84.1.ppc64",
"product_id": "kernel-source-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-84.1.ppc64",
"product_id": "kernel-syms-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-84.1.ppc64",
"product_id": "kernel-trace-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-84.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-84.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-84.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-84.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-84.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-84.1.s390x",
"product": {
"name": "kernel-default-3.0.101-84.1.s390x",
"product_id": "kernel-default-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-84.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-84.1.s390x",
"product_id": "kernel-default-base-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-84.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-84.1.s390x",
"product_id": "kernel-default-devel-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-84.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-84.1.s390x",
"product_id": "kernel-default-man-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-84.1.s390x",
"product": {
"name": "kernel-source-3.0.101-84.1.s390x",
"product_id": "kernel-source-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-84.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-84.1.s390x",
"product_id": "kernel-syms-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-84.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-84.1.s390x",
"product_id": "kernel-trace-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-84.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-84.1.s390x",
"product_id": "kernel-trace-base-3.0.101-84.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-84.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-84.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-84.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-84.1.x86_64",
"product_id": "kernel-default-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-84.1.x86_64",
"product_id": "kernel-default-base-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-84.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-84.1.x86_64",
"product_id": "kernel-ec2-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-84.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-84.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-84.1.x86_64",
"product_id": "kernel-source-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-84.1.x86_64",
"product_id": "kernel-syms-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-84.1.x86_64",
"product_id": "kernel-trace-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-84.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-84.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-84.1.x86_64",
"product_id": "kernel-xen-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-84.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-84.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-84.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-84.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-84.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-3.0.101-84.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch"
},
"product_reference": "kernel-docs-3.0.101-84.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586"
},
"product_reference": "kernel-source-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64"
},
"product_reference": "kernel-source-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x"
},
"product_reference": "kernel-source-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586"
},
"product_reference": "kernel-syms-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586"
},
"product_reference": "kernel-source-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64"
},
"product_reference": "kernel-source-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x"
},
"product_reference": "kernel-source-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586"
},
"product_reference": "kernel-syms-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64"
},
"product_reference": "kernel-syms-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-84.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-84.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T11:53:13Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2633-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:18 - Updated: 2016-10-25 21:18Summary
Security update for Linux Kernel Live Patch 11 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 11 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2633-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2633-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162633-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2633-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002357.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE Bug 986377",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 11 for SLE 12",
"tracking": {
"current_release_date": "2016-10-25T21:18:09Z",
"generator": {
"date": "2016-10-25T21:18:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2633-1",
"initial_release_date": "2016-10-25T21:18:09Z",
"revision_history": [
{
"date": "2016-10-25T21:18:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:09Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:09Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2631-1
Vulnerability from csaf_suse - Published: 2016-10-25 15:35 - Updated: 2016-10-25 15:35Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.49-11 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1545
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.49-11 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1545",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2631-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2631-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162631-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2631-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002355.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T15:35:03Z",
"generator": {
"date": "2016-10-25T15:35:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2631-1",
"initial_release_date": "2016-10-25T15:35:03Z",
"revision_history": [
{
"date": "2016-10-25T15:35:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"product": {
"name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"product_id": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64",
"product": {
"name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64",
"product_id": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64"
},
"product_reference": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
},
"product_reference": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:03Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:03Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2637-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:19 - Updated: 2016-10-25 21:19Summary
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1552
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.59-60_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1552",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2637-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2637-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162637-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2637-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002361.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T21:19:09Z",
"generator": {
"date": "2016-10-25T21:19:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2637-1",
"initial_release_date": "2016-10-25T21:19:09Z",
"revision_history": [
{
"date": "2016-10-25T21:19:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:09Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:09Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:3069-1
Vulnerability from csaf_suse - Published: 2016-12-09 13:20 - Updated: 2016-12-09 13:20Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
This feature was added:
- Support for the 2017 Intel Purley platform.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg.
- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.
- ALSA: hda - Add Intel Lewisburg device IDs Audio.
- avoid dentry crash triggered by NFS (bsc#984194).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- fs/select: introduce SIZE_MAX (bsc#1000189).
- i2c: i801: add Intel Lewisburg device IDs.
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- md: lockless I/O submission for RAID1 (bsc#982783).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Don't disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Don't write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- random32: add prandom_u32_max (bsc#989152).
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- s390/dasd: fix hanging device after clear subchannel (bnc#994436).
- sata: Adding Intel Lewisburg device IDs for SATA.
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: don't deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
Patchnames
slertesp4-kernel-source-12880
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThis feature was added:\n\n- Support for the 2017 Intel Purley platform. \n\nThe following security bugs were fixed:\n\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg.\n- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.\n- ALSA: hda - Add Intel Lewisburg device IDs Audio.\n- avoid dentry crash triggered by NFS (bsc#984194).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- fs/select: introduce SIZE_MAX (bsc#1000189).\n- i2c: i801: add Intel Lewisburg device IDs.\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Don\u0027t disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Don\u0027t write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- random32: add prandom_u32_max (bsc#989152).\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436).\n- sata: Adding Intel Lewisburg device IDs for SATA.\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: don\u0027t deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slertesp4-kernel-source-12880",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3069-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:3069-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163069-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:3069-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000189",
"url": "https://bugzilla.suse.com/1000189"
},
{
"category": "self",
"summary": "SUSE Bug 1001419",
"url": "https://bugzilla.suse.com/1001419"
},
{
"category": "self",
"summary": "SUSE Bug 1002165",
"url": "https://bugzilla.suse.com/1002165"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE Bug 732582",
"url": "https://bugzilla.suse.com/732582"
},
{
"category": "self",
"summary": "SUSE Bug 839104",
"url": "https://bugzilla.suse.com/839104"
},
{
"category": "self",
"summary": "SUSE Bug 843236",
"url": "https://bugzilla.suse.com/843236"
},
{
"category": "self",
"summary": "SUSE Bug 909994",
"url": "https://bugzilla.suse.com/909994"
},
{
"category": "self",
"summary": "SUSE Bug 911687",
"url": "https://bugzilla.suse.com/911687"
},
{
"category": "self",
"summary": "SUSE Bug 915183",
"url": "https://bugzilla.suse.com/915183"
},
{
"category": "self",
"summary": "SUSE Bug 920016",
"url": "https://bugzilla.suse.com/920016"
},
{
"category": "self",
"summary": "SUSE Bug 934760",
"url": "https://bugzilla.suse.com/934760"
},
{
"category": "self",
"summary": "SUSE Bug 951392",
"url": "https://bugzilla.suse.com/951392"
},
{
"category": "self",
"summary": "SUSE Bug 956514",
"url": "https://bugzilla.suse.com/956514"
},
{
"category": "self",
"summary": "SUSE Bug 960689",
"url": "https://bugzilla.suse.com/960689"
},
{
"category": "self",
"summary": "SUSE Bug 963655",
"url": "https://bugzilla.suse.com/963655"
},
{
"category": "self",
"summary": "SUSE Bug 971975",
"url": "https://bugzilla.suse.com/971975"
},
{
"category": "self",
"summary": "SUSE Bug 971989",
"url": "https://bugzilla.suse.com/971989"
},
{
"category": "self",
"summary": "SUSE Bug 974620",
"url": "https://bugzilla.suse.com/974620"
},
{
"category": "self",
"summary": "SUSE Bug 976867",
"url": "https://bugzilla.suse.com/976867"
},
{
"category": "self",
"summary": "SUSE Bug 977687",
"url": "https://bugzilla.suse.com/977687"
},
{
"category": "self",
"summary": "SUSE Bug 979514",
"url": "https://bugzilla.suse.com/979514"
},
{
"category": "self",
"summary": "SUSE Bug 979595",
"url": "https://bugzilla.suse.com/979595"
},
{
"category": "self",
"summary": "SUSE Bug 979681",
"url": "https://bugzilla.suse.com/979681"
},
{
"category": "self",
"summary": "SUSE Bug 980371",
"url": "https://bugzilla.suse.com/980371"
},
{
"category": "self",
"summary": "SUSE Bug 982218",
"url": "https://bugzilla.suse.com/982218"
},
{
"category": "self",
"summary": "SUSE Bug 982783",
"url": "https://bugzilla.suse.com/982783"
},
{
"category": "self",
"summary": "SUSE Bug 983535",
"url": "https://bugzilla.suse.com/983535"
},
{
"category": "self",
"summary": "SUSE Bug 983619",
"url": "https://bugzilla.suse.com/983619"
},
{
"category": "self",
"summary": "SUSE Bug 984102",
"url": "https://bugzilla.suse.com/984102"
},
{
"category": "self",
"summary": "SUSE Bug 984194",
"url": "https://bugzilla.suse.com/984194"
},
{
"category": "self",
"summary": "SUSE Bug 984992",
"url": "https://bugzilla.suse.com/984992"
},
{
"category": "self",
"summary": "SUSE Bug 985206",
"url": "https://bugzilla.suse.com/985206"
},
{
"category": "self",
"summary": "SUSE Bug 986362",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "self",
"summary": "SUSE Bug 986365",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "self",
"summary": "SUSE Bug 986445",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "self",
"summary": "SUSE Bug 987565",
"url": "https://bugzilla.suse.com/987565"
},
{
"category": "self",
"summary": "SUSE Bug 988440",
"url": "https://bugzilla.suse.com/988440"
},
{
"category": "self",
"summary": "SUSE Bug 989152",
"url": "https://bugzilla.suse.com/989152"
},
{
"category": "self",
"summary": "SUSE Bug 989261",
"url": "https://bugzilla.suse.com/989261"
},
{
"category": "self",
"summary": "SUSE Bug 989779",
"url": "https://bugzilla.suse.com/989779"
},
{
"category": "self",
"summary": "SUSE Bug 991608",
"url": "https://bugzilla.suse.com/991608"
},
{
"category": "self",
"summary": "SUSE Bug 991665",
"url": "https://bugzilla.suse.com/991665"
},
{
"category": "self",
"summary": "SUSE Bug 991923",
"url": "https://bugzilla.suse.com/991923"
},
{
"category": "self",
"summary": "SUSE Bug 992566",
"url": "https://bugzilla.suse.com/992566"
},
{
"category": "self",
"summary": "SUSE Bug 993127",
"url": "https://bugzilla.suse.com/993127"
},
{
"category": "self",
"summary": "SUSE Bug 993890",
"url": "https://bugzilla.suse.com/993890"
},
{
"category": "self",
"summary": "SUSE Bug 993891",
"url": "https://bugzilla.suse.com/993891"
},
{
"category": "self",
"summary": "SUSE Bug 994296",
"url": "https://bugzilla.suse.com/994296"
},
{
"category": "self",
"summary": "SUSE Bug 994436",
"url": "https://bugzilla.suse.com/994436"
},
{
"category": "self",
"summary": "SUSE Bug 994618",
"url": "https://bugzilla.suse.com/994618"
},
{
"category": "self",
"summary": "SUSE Bug 994759",
"url": "https://bugzilla.suse.com/994759"
},
{
"category": "self",
"summary": "SUSE Bug 994926",
"url": "https://bugzilla.suse.com/994926"
},
{
"category": "self",
"summary": "SUSE Bug 996329",
"url": "https://bugzilla.suse.com/996329"
},
{
"category": "self",
"summary": "SUSE Bug 996664",
"url": "https://bugzilla.suse.com/996664"
},
{
"category": "self",
"summary": "SUSE Bug 997708",
"url": "https://bugzilla.suse.com/997708"
},
{
"category": "self",
"summary": "SUSE Bug 998399",
"url": "https://bugzilla.suse.com/998399"
},
{
"category": "self",
"summary": "SUSE Bug 999584",
"url": "https://bugzilla.suse.com/999584"
},
{
"category": "self",
"summary": "SUSE Bug 999600",
"url": "https://bugzilla.suse.com/999600"
},
{
"category": "self",
"summary": "SUSE Bug 999932",
"url": "https://bugzilla.suse.com/999932"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4312 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4312/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7513 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0823 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0823/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3841 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5696 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6480 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6828 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7425 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7425/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-12-09T13:20:33Z",
"generator": {
"date": "2016-12-09T13:20:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:3069-1",
"initial_release_date": "2016-12-09T13:20:33Z",
"revision_history": [
{
"date": "2016-12-09T13:20:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt-base-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-source-rt-3.0.101.rt130-65.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64",
"product_id": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4",
"product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-4312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4312"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4312",
"url": "https://www.suse.com/security/cve/CVE-2013-4312"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2013-4312",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 839104 for CVE-2013-4312",
"url": "https://bugzilla.suse.com/839104"
},
{
"category": "external",
"summary": "SUSE Bug 922947 for CVE-2013-4312",
"url": "https://bugzilla.suse.com/922947"
},
{
"category": "external",
"summary": "SUSE Bug 968014 for CVE-2013-4312",
"url": "https://bugzilla.suse.com/968014"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "low"
}
],
"title": "CVE-2013-4312"
},
{
"cve": "CVE-2015-7513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7513"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7513",
"url": "https://www.suse.com/security/cve/CVE-2015-7513"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2015-7513",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 960689 for CVE-2015-7513",
"url": "https://bugzilla.suse.com/960689"
},
{
"category": "external",
"summary": "SUSE Bug 987709 for CVE-2015-7513",
"url": "https://bugzilla.suse.com/987709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2015-7513"
},
{
"cve": "CVE-2016-0823",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0823"
}
],
"notes": [
{
"category": "general",
"text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0823",
"url": "https://www.suse.com/security/cve/CVE-2016-0823"
},
{
"category": "external",
"summary": "SUSE Bug 987709 for CVE-2016-0823",
"url": "https://bugzilla.suse.com/987709"
},
{
"category": "external",
"summary": "SUSE Bug 994759 for CVE-2016-0823",
"url": "https://bugzilla.suse.com/994759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "low"
}
],
"title": "CVE-2016-0823"
},
{
"cve": "CVE-2016-3841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3841"
}
],
"notes": [
{
"category": "general",
"text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3841",
"url": "https://www.suse.com/security/cve/CVE-2016-3841"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-3841",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-3841",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 992566 for CVE-2016-3841",
"url": "https://bugzilla.suse.com/992566"
},
{
"category": "external",
"summary": "SUSE Bug 992569 for CVE-2016-3841",
"url": "https://bugzilla.suse.com/992569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2016-3841"
},
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-5696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5696"
}
],
"notes": [
{
"category": "general",
"text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5696",
"url": "https://www.suse.com/security/cve/CVE-2016-5696"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1175721 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/1175721"
},
{
"category": "external",
"summary": "SUSE Bug 989152 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/989152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2016-5696"
},
{
"cve": "CVE-2016-6480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6480"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6480",
"url": "https://www.suse.com/security/cve/CVE-2016-6480"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 991608 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991608"
},
{
"category": "external",
"summary": "SUSE Bug 991667 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991667"
},
{
"category": "external",
"summary": "SUSE Bug 992568 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/992568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2016-6480"
},
{
"cve": "CVE-2016-6828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6828"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6828",
"url": "https://www.suse.com/security/cve/CVE-2016-6828"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 994296 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/994296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2016-6828"
},
{
"cve": "CVE-2016-7425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7425"
}
],
"notes": [
{
"category": "general",
"text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7425",
"url": "https://www.suse.com/security/cve/CVE-2016-7425"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 999932 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/999932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64",
"SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-09T13:20:33Z",
"details": "moderate"
}
],
"title": "CVE-2016-7425"
}
]
}
SUSE-SU-2016:2659-1
Vulnerability from csaf_suse - Published: 2016-10-26 19:54 - Updated: 2016-10-26 19:54Summary
Security update for Linux Kernel Live Patch 13 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 13 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 13 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.55-52_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2659-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2659-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162659-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2659-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002370.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE Bug 986377",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 13 for SLE 12",
"tracking": {
"current_release_date": "2016-10-26T19:54:42Z",
"generator": {
"date": "2016-10-26T19:54:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2659-1",
"initial_release_date": "2016-10-26T19:54:42Z",
"revision_history": [
{
"date": "2016-10-26T19:54:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T19:54:42Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T19:54:42Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2658-1
Vulnerability from csaf_suse - Published: 2016-10-26 19:54 - Updated: 2016-10-26 19:54Summary
Security update for Linux Kernel Live Patch 14 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 14 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_49 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 14 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.60-52_49 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2658-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2658-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162658-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2658-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002369.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE Bug 986377",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 14 for SLE 12",
"tracking": {
"current_release_date": "2016-10-26T19:54:12Z",
"generator": {
"date": "2016-10-26T19:54:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2658-1",
"initial_release_date": "2016-10-26T19:54:12Z",
"revision_history": [
{
"date": "2016-10-26T19:54:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T19:54:12Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T19:54:12Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2634-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:18 - Updated: 2016-10-25 21:18Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.53-60_30 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1550
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.53-60_30 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1550",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2634-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2634-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162634-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2634-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002358.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T21:18:38Z",
"generator": {
"date": "2016-10-25T21:18:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2634-1",
"initial_release_date": "2016-10-25T21:18:38Z",
"revision_history": [
{
"date": "2016-10-25T21:18:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"product_id": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64",
"product_id": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:38Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:38Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2655-1
Vulnerability from csaf_suse - Published: 2016-10-26 14:15 - Updated: 2016-10-26 14:15Summary
Security update for Linux Kernel Live Patch 12 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_42 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 12 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.55-52_42 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2655-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2655-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162655-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2655-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002367.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE Bug 986377",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 12 for SLE 12",
"tracking": {
"current_release_date": "2016-10-26T14:15:52Z",
"generator": {
"date": "2016-10-26T14:15:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2655-1",
"initial_release_date": "2016-10-26T14:15:52Z",
"revision_history": [
{
"date": "2016-10-26T14:15:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T14:15:52Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T14:15:52Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2657-1
Vulnerability from csaf_suse - Published: 2016-10-26 19:54 - Updated: 2016-10-26 19:54Summary
Security update for Linux Kernel Live Patch 15 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 15 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_54 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
Patchnames
SUSE-SLE-SAP-12-2016-1562,SUSE-SLE-SERVER-12-2016-1562
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 15 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.60-52_54 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1562,SUSE-SLE-SERVER-12-2016-1562",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2657-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2657-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162657-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2657-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002368.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 15 for SLE 12",
"tracking": {
"current_release_date": "2016-10-26T19:54:26Z",
"generator": {
"date": "2016-10-26T19:54:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2657-1",
"initial_release_date": "2016-10-26T19:54:26Z",
"revision_history": [
{
"date": "2016-10-26T19:54:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-26T19:54:26Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2632-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:19 - Updated: 2016-10-25 21:19Summary
Security update for Linux Kernel Live Patch 10 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_34 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
Patchnames
SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 10 for SLE 12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.51-52_34 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2632-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2632-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162632-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2632-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002356.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE Bug 986362",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for Linux Kernel Live Patch 10 for SLE 12",
"tracking": {
"current_release_date": "2016-10-25T21:19:41Z",
"generator": {
"date": "2016-10-25T21:19:41Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2632-1",
"initial_release_date": "2016-10-25T21:19:41Z",
"revision_history": [
{
"date": "2016-10-25T21:19:41Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:41Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:19:41Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2638-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:18 - Updated: 2016-10-25 21:18Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.57-60_35 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1551
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.57-60_35 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1551",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2638-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2638-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162638-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2638-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002362.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T21:18:56Z",
"generator": {
"date": "2016-10-25T21:18:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2638-1",
"initial_release_date": "2016-10-25T21:18:56Z",
"revision_history": [
{
"date": "2016-10-25T21:18:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:56Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:56Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:3304-1
Vulnerability from csaf_suse - Published: 2016-12-30 13:09 - Updated: 2016-12-30 13:09Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set.
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there (FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThis feature was added:\n\n- fate#320805: Execute in place (XIP) support for the ext2 filesystem.\n\nThe following security bugs were fixed:\n\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542)\n- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can\u0027t wake up.\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don\u0027t check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don\u0027t leak iomapped memory on removal (bsc#921784 FATE#318561).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).\n- be2net: remove vlan promisc capability from VF\u0027s profile descriptors (bsc#921784 FATE#318561).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size().\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.\n- bonding: Prevent IPv6 link local address on enslaved devices.\n- bonding: prevent out of bound accesses.\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the \u0027request\u0027, not the \u0027response\u0027 (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195).\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc-\u003ereq_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- msi-x: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don\u0027t truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oops on restarting network with bonding mode4 (lacp) (bsc#876145).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for \u0027cycles:p\u0027 and \u0027cycles:pp\u0027 on SLM (bsc#997896).\n- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup-\u003ereserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- Revert \u0027Input: i8042 - break load dependency between atkbd/psmouse and i8042\u0027.\n- Revert \u0027Input: i8042 - set up shared ps2_cmd_mutex for AUX ports\u0027.\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays.\n- RTNL: assertion failed at dev.c (bsc#875631).\n- s390: add SMT support (bnc#994438).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- SUNRPC: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set.\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don\u0027t invoke -\u003eis_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: Check if slot is already in default state before moving it there (FATE#315518).\n- xhci: silence warnings in switch (bnc#991665).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-RT-12-SP1-2016-1938",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3304-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:3304-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:3304-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html"
},
{
"category": "self",
"summary": "SUSE Bug 1000189",
"url": "https://bugzilla.suse.com/1000189"
},
{
"category": "self",
"summary": "SUSE Bug 1000287",
"url": "https://bugzilla.suse.com/1000287"
},
{
"category": "self",
"summary": "SUSE Bug 1000304",
"url": "https://bugzilla.suse.com/1000304"
},
{
"category": "self",
"summary": "SUSE Bug 1000776",
"url": "https://bugzilla.suse.com/1000776"
},
{
"category": "self",
"summary": "SUSE Bug 1001419",
"url": "https://bugzilla.suse.com/1001419"
},
{
"category": "self",
"summary": "SUSE Bug 1001486",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "self",
"summary": "SUSE Bug 1002165",
"url": "https://bugzilla.suse.com/1002165"
},
{
"category": "self",
"summary": "SUSE Bug 1003079",
"url": "https://bugzilla.suse.com/1003079"
},
{
"category": "self",
"summary": "SUSE Bug 1003153",
"url": "https://bugzilla.suse.com/1003153"
},
{
"category": "self",
"summary": "SUSE Bug 1003400",
"url": "https://bugzilla.suse.com/1003400"
},
{
"category": "self",
"summary": "SUSE Bug 1003568",
"url": "https://bugzilla.suse.com/1003568"
},
{
"category": "self",
"summary": "SUSE Bug 1003925",
"url": "https://bugzilla.suse.com/1003925"
},
{
"category": "self",
"summary": "SUSE Bug 1004252",
"url": "https://bugzilla.suse.com/1004252"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE Bug 1004462",
"url": "https://bugzilla.suse.com/1004462"
},
{
"category": "self",
"summary": "SUSE Bug 1004517",
"url": "https://bugzilla.suse.com/1004517"
},
{
"category": "self",
"summary": "SUSE Bug 1004520",
"url": "https://bugzilla.suse.com/1004520"
},
{
"category": "self",
"summary": "SUSE Bug 1005666",
"url": "https://bugzilla.suse.com/1005666"
},
{
"category": "self",
"summary": "SUSE Bug 1006691",
"url": "https://bugzilla.suse.com/1006691"
},
{
"category": "self",
"summary": "SUSE Bug 1007615",
"url": "https://bugzilla.suse.com/1007615"
},
{
"category": "self",
"summary": "SUSE Bug 1007886",
"url": "https://bugzilla.suse.com/1007886"
},
{
"category": "self",
"summary": "SUSE Bug 744692",
"url": "https://bugzilla.suse.com/744692"
},
{
"category": "self",
"summary": "SUSE Bug 789311",
"url": "https://bugzilla.suse.com/789311"
},
{
"category": "self",
"summary": "SUSE Bug 857397",
"url": "https://bugzilla.suse.com/857397"
},
{
"category": "self",
"summary": "SUSE Bug 860441",
"url": "https://bugzilla.suse.com/860441"
},
{
"category": "self",
"summary": "SUSE Bug 865545",
"url": "https://bugzilla.suse.com/865545"
},
{
"category": "self",
"summary": "SUSE Bug 866130",
"url": "https://bugzilla.suse.com/866130"
},
{
"category": "self",
"summary": "SUSE Bug 868923",
"url": "https://bugzilla.suse.com/868923"
},
{
"category": "self",
"summary": "SUSE Bug 874131",
"url": "https://bugzilla.suse.com/874131"
},
{
"category": "self",
"summary": "SUSE Bug 875631",
"url": "https://bugzilla.suse.com/875631"
},
{
"category": "self",
"summary": "SUSE Bug 876145",
"url": "https://bugzilla.suse.com/876145"
},
{
"category": "self",
"summary": "SUSE Bug 876463",
"url": "https://bugzilla.suse.com/876463"
},
{
"category": "self",
"summary": "SUSE Bug 898675",
"url": "https://bugzilla.suse.com/898675"
},
{
"category": "self",
"summary": "SUSE Bug 904489",
"url": "https://bugzilla.suse.com/904489"
},
{
"category": "self",
"summary": "SUSE Bug 909994",
"url": "https://bugzilla.suse.com/909994"
},
{
"category": "self",
"summary": "SUSE Bug 911687",
"url": "https://bugzilla.suse.com/911687"
},
{
"category": "self",
"summary": "SUSE Bug 915183",
"url": "https://bugzilla.suse.com/915183"
},
{
"category": "self",
"summary": "SUSE Bug 921338",
"url": "https://bugzilla.suse.com/921338"
},
{
"category": "self",
"summary": "SUSE Bug 921784",
"url": "https://bugzilla.suse.com/921784"
},
{
"category": "self",
"summary": "SUSE Bug 922064",
"url": "https://bugzilla.suse.com/922064"
},
{
"category": "self",
"summary": "SUSE Bug 922634",
"url": "https://bugzilla.suse.com/922634"
},
{
"category": "self",
"summary": "SUSE Bug 924381",
"url": "https://bugzilla.suse.com/924381"
},
{
"category": "self",
"summary": "SUSE Bug 924384",
"url": "https://bugzilla.suse.com/924384"
},
{
"category": "self",
"summary": "SUSE Bug 930399",
"url": "https://bugzilla.suse.com/930399"
},
{
"category": "self",
"summary": "SUSE Bug 934067",
"url": "https://bugzilla.suse.com/934067"
},
{
"category": "self",
"summary": "SUSE Bug 937086",
"url": "https://bugzilla.suse.com/937086"
},
{
"category": "self",
"summary": "SUSE Bug 937888",
"url": "https://bugzilla.suse.com/937888"
},
{
"category": "self",
"summary": "SUSE Bug 941420",
"url": "https://bugzilla.suse.com/941420"
},
{
"category": "self",
"summary": "SUSE Bug 946309",
"url": "https://bugzilla.suse.com/946309"
},
{
"category": "self",
"summary": "SUSE Bug 955446",
"url": "https://bugzilla.suse.com/955446"
},
{
"category": "self",
"summary": "SUSE Bug 956514",
"url": "https://bugzilla.suse.com/956514"
},
{
"category": "self",
"summary": "SUSE Bug 959463",
"url": "https://bugzilla.suse.com/959463"
},
{
"category": "self",
"summary": "SUSE Bug 961257",
"url": "https://bugzilla.suse.com/961257"
},
{
"category": "self",
"summary": "SUSE Bug 962846",
"url": "https://bugzilla.suse.com/962846"
},
{
"category": "self",
"summary": "SUSE Bug 963655",
"url": "https://bugzilla.suse.com/963655"
},
{
"category": "self",
"summary": "SUSE Bug 963767",
"url": "https://bugzilla.suse.com/963767"
},
{
"category": "self",
"summary": "SUSE Bug 966864",
"url": "https://bugzilla.suse.com/966864"
},
{
"category": "self",
"summary": "SUSE Bug 967640",
"url": "https://bugzilla.suse.com/967640"
},
{
"category": "self",
"summary": "SUSE Bug 970943",
"url": "https://bugzilla.suse.com/970943"
},
{
"category": "self",
"summary": "SUSE Bug 971975",
"url": "https://bugzilla.suse.com/971975"
},
{
"category": "self",
"summary": "SUSE Bug 971989",
"url": "https://bugzilla.suse.com/971989"
},
{
"category": "self",
"summary": "SUSE Bug 974406",
"url": "https://bugzilla.suse.com/974406"
},
{
"category": "self",
"summary": "SUSE Bug 974620",
"url": "https://bugzilla.suse.com/974620"
},
{
"category": "self",
"summary": "SUSE Bug 975596",
"url": "https://bugzilla.suse.com/975596"
},
{
"category": "self",
"summary": "SUSE Bug 975772",
"url": "https://bugzilla.suse.com/975772"
},
{
"category": "self",
"summary": "SUSE Bug 976195",
"url": "https://bugzilla.suse.com/976195"
},
{
"category": "self",
"summary": "SUSE Bug 977687",
"url": "https://bugzilla.suse.com/977687"
},
{
"category": "self",
"summary": "SUSE Bug 978094",
"url": "https://bugzilla.suse.com/978094"
},
{
"category": "self",
"summary": "SUSE Bug 979451",
"url": "https://bugzilla.suse.com/979451"
},
{
"category": "self",
"summary": "SUSE Bug 979681",
"url": "https://bugzilla.suse.com/979681"
},
{
"category": "self",
"summary": "SUSE Bug 979928",
"url": "https://bugzilla.suse.com/979928"
},
{
"category": "self",
"summary": "SUSE Bug 980371",
"url": "https://bugzilla.suse.com/980371"
},
{
"category": "self",
"summary": "SUSE Bug 981597",
"url": "https://bugzilla.suse.com/981597"
},
{
"category": "self",
"summary": "SUSE Bug 982783",
"url": "https://bugzilla.suse.com/982783"
},
{
"category": "self",
"summary": "SUSE Bug 983619",
"url": "https://bugzilla.suse.com/983619"
},
{
"category": "self",
"summary": "SUSE Bug 984194",
"url": "https://bugzilla.suse.com/984194"
},
{
"category": "self",
"summary": "SUSE Bug 984419",
"url": "https://bugzilla.suse.com/984419"
},
{
"category": "self",
"summary": "SUSE Bug 984779",
"url": "https://bugzilla.suse.com/984779"
},
{
"category": "self",
"summary": "SUSE Bug 984992",
"url": "https://bugzilla.suse.com/984992"
},
{
"category": "self",
"summary": "SUSE Bug 985562",
"url": "https://bugzilla.suse.com/985562"
},
{
"category": "self",
"summary": "SUSE Bug 986362",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "self",
"summary": "SUSE Bug 986365",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "self",
"summary": "SUSE Bug 986445",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "self",
"summary": "SUSE Bug 987192",
"url": "https://bugzilla.suse.com/987192"
},
{
"category": "self",
"summary": "SUSE Bug 987333",
"url": "https://bugzilla.suse.com/987333"
},
{
"category": "self",
"summary": "SUSE Bug 987542",
"url": "https://bugzilla.suse.com/987542"
},
{
"category": "self",
"summary": "SUSE Bug 987565",
"url": "https://bugzilla.suse.com/987565"
},
{
"category": "self",
"summary": "SUSE Bug 987621",
"url": "https://bugzilla.suse.com/987621"
},
{
"category": "self",
"summary": "SUSE Bug 987805",
"url": "https://bugzilla.suse.com/987805"
},
{
"category": "self",
"summary": "SUSE Bug 988440",
"url": "https://bugzilla.suse.com/988440"
},
{
"category": "self",
"summary": "SUSE Bug 988617",
"url": "https://bugzilla.suse.com/988617"
},
{
"category": "self",
"summary": "SUSE Bug 988715",
"url": "https://bugzilla.suse.com/988715"
},
{
"category": "self",
"summary": "SUSE Bug 989152",
"url": "https://bugzilla.suse.com/989152"
},
{
"category": "self",
"summary": "SUSE Bug 989953",
"url": "https://bugzilla.suse.com/989953"
},
{
"category": "self",
"summary": "SUSE Bug 990058",
"url": "https://bugzilla.suse.com/990058"
},
{
"category": "self",
"summary": "SUSE Bug 990245",
"url": "https://bugzilla.suse.com/990245"
},
{
"category": "self",
"summary": "SUSE Bug 991247",
"url": "https://bugzilla.suse.com/991247"
},
{
"category": "self",
"summary": "SUSE Bug 991608",
"url": "https://bugzilla.suse.com/991608"
},
{
"category": "self",
"summary": "SUSE Bug 991665",
"url": "https://bugzilla.suse.com/991665"
},
{
"category": "self",
"summary": "SUSE Bug 991667",
"url": "https://bugzilla.suse.com/991667"
},
{
"category": "self",
"summary": "SUSE Bug 992244",
"url": "https://bugzilla.suse.com/992244"
},
{
"category": "self",
"summary": "SUSE Bug 992555",
"url": "https://bugzilla.suse.com/992555"
},
{
"category": "self",
"summary": "SUSE Bug 992568",
"url": "https://bugzilla.suse.com/992568"
},
{
"category": "self",
"summary": "SUSE Bug 992591",
"url": "https://bugzilla.suse.com/992591"
},
{
"category": "self",
"summary": "SUSE Bug 992593",
"url": "https://bugzilla.suse.com/992593"
},
{
"category": "self",
"summary": "SUSE Bug 992712",
"url": "https://bugzilla.suse.com/992712"
},
{
"category": "self",
"summary": "SUSE Bug 993392",
"url": "https://bugzilla.suse.com/993392"
},
{
"category": "self",
"summary": "SUSE Bug 993841",
"url": "https://bugzilla.suse.com/993841"
},
{
"category": "self",
"summary": "SUSE Bug 993890",
"url": "https://bugzilla.suse.com/993890"
},
{
"category": "self",
"summary": "SUSE Bug 993891",
"url": "https://bugzilla.suse.com/993891"
},
{
"category": "self",
"summary": "SUSE Bug 994167",
"url": "https://bugzilla.suse.com/994167"
},
{
"category": "self",
"summary": "SUSE Bug 994296",
"url": "https://bugzilla.suse.com/994296"
},
{
"category": "self",
"summary": "SUSE Bug 994438",
"url": "https://bugzilla.suse.com/994438"
},
{
"category": "self",
"summary": "SUSE Bug 994520",
"url": "https://bugzilla.suse.com/994520"
},
{
"category": "self",
"summary": "SUSE Bug 994758",
"url": "https://bugzilla.suse.com/994758"
},
{
"category": "self",
"summary": "SUSE Bug 995153",
"url": "https://bugzilla.suse.com/995153"
},
{
"category": "self",
"summary": "SUSE Bug 995968",
"url": "https://bugzilla.suse.com/995968"
},
{
"category": "self",
"summary": "SUSE Bug 996664",
"url": "https://bugzilla.suse.com/996664"
},
{
"category": "self",
"summary": "SUSE Bug 997059",
"url": "https://bugzilla.suse.com/997059"
},
{
"category": "self",
"summary": "SUSE Bug 997299",
"url": "https://bugzilla.suse.com/997299"
},
{
"category": "self",
"summary": "SUSE Bug 997708",
"url": "https://bugzilla.suse.com/997708"
},
{
"category": "self",
"summary": "SUSE Bug 997896",
"url": "https://bugzilla.suse.com/997896"
},
{
"category": "self",
"summary": "SUSE Bug 998689",
"url": "https://bugzilla.suse.com/998689"
},
{
"category": "self",
"summary": "SUSE Bug 998795",
"url": "https://bugzilla.suse.com/998795"
},
{
"category": "self",
"summary": "SUSE Bug 998825",
"url": "https://bugzilla.suse.com/998825"
},
{
"category": "self",
"summary": "SUSE Bug 999577",
"url": "https://bugzilla.suse.com/999577"
},
{
"category": "self",
"summary": "SUSE Bug 999584",
"url": "https://bugzilla.suse.com/999584"
},
{
"category": "self",
"summary": "SUSE Bug 999600",
"url": "https://bugzilla.suse.com/999600"
},
{
"category": "self",
"summary": "SUSE Bug 999779",
"url": "https://bugzilla.suse.com/999779"
},
{
"category": "self",
"summary": "SUSE Bug 999907",
"url": "https://bugzilla.suse.com/999907"
},
{
"category": "self",
"summary": "SUSE Bug 999932",
"url": "https://bugzilla.suse.com/999932"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8956 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2069 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4997 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5696 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6130 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6327 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6480 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6480/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6828 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7042 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7097 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7425 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8658 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8658/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-12-30T13:09:04Z",
"generator": {
"date": "2016-12-30T13:09:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:3304-1",
"initial_release_date": "2016-12-30T13:09:04Z",
"revision_history": [
{
"date": "2016-12-30T13:09:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-3.12.67-60.27.1.noarch",
"product": {
"name": "kernel-devel-rt-3.12.67-60.27.1.noarch",
"product_id": "kernel-devel-rt-3.12.67-60.27.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-3.12.67-60.27.1.noarch",
"product": {
"name": "kernel-source-rt-3.12.67-60.27.1.noarch",
"product_id": "kernel-source-rt-3.12.67-60.27.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-compute-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-compute-3.12.67-60.27.1.x86_64",
"product_id": "kernel-compute-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-compute-base-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-compute-base-3.12.67-60.27.1.x86_64",
"product_id": "kernel-compute-base-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-compute-devel-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-compute-devel-3.12.67-60.27.1.x86_64",
"product_id": "kernel-compute-devel-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"product_id": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-rt-3.12.67-60.27.1.x86_64",
"product_id": "kernel-rt-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-rt-base-3.12.67-60.27.1.x86_64",
"product_id": "kernel-rt-base-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-rt-devel-3.12.67-60.27.1.x86_64",
"product_id": "kernel-rt-devel-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"product_id": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-3.12.67-60.27.1.x86_64",
"product": {
"name": "kernel-syms-rt-3.12.67-60.27.1.x86_64",
"product_id": "kernel-syms-rt-3.12.67-60.27.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-compute-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-compute-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-compute-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-compute-base-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-compute-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-compute-devel-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch"
},
"product_reference": "kernel-devel-rt-3.12.67-60.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-rt-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-rt-base-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-rt-devel-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch"
},
"product_reference": "kernel-source-rt-3.12.67-60.27.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1",
"product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
},
"product_reference": "kernel-syms-rt-3.12.67-60.27.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-8956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8956"
}
],
"notes": [
{
"category": "general",
"text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8956",
"url": "https://www.suse.com/security/cve/CVE-2015-8956"
},
{
"category": "external",
"summary": "SUSE Bug 1003925 for CVE-2015-8956",
"url": "https://bugzilla.suse.com/1003925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2015-8956"
},
{
"cve": "CVE-2016-2069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2069"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2069",
"url": "https://www.suse.com/security/cve/CVE-2016-2069"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-2069",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-2069",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-2069",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 963767 for CVE-2016-2069",
"url": "https://bugzilla.suse.com/963767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "low"
}
],
"title": "CVE-2016-2069"
},
{
"cve": "CVE-2016-4997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4997"
}
],
"notes": [
{
"category": "general",
"text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4997",
"url": "https://www.suse.com/security/cve/CVE-2016-4997"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 986362 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986362"
},
{
"category": "external",
"summary": "SUSE Bug 986365 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986365"
},
{
"category": "external",
"summary": "SUSE Bug 986377 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/986377"
},
{
"category": "external",
"summary": "SUSE Bug 991651 for CVE-2016-4997",
"url": "https://bugzilla.suse.com/991651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "important"
}
],
"title": "CVE-2016-4997"
},
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-5696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5696"
}
],
"notes": [
{
"category": "general",
"text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5696",
"url": "https://www.suse.com/security/cve/CVE-2016-5696"
},
{
"category": "external",
"summary": "SUSE Bug 1020452 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/1020452"
},
{
"category": "external",
"summary": "SUSE Bug 1175721 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/1175721"
},
{
"category": "external",
"summary": "SUSE Bug 989152 for CVE-2016-5696",
"url": "https://bugzilla.suse.com/989152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-5696"
},
{
"cve": "CVE-2016-6130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6130"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6130",
"url": "https://www.suse.com/security/cve/CVE-2016-6130"
},
{
"category": "external",
"summary": "SUSE Bug 987542 for CVE-2016-6130",
"url": "https://bugzilla.suse.com/987542"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "low"
}
],
"title": "CVE-2016-6130"
},
{
"cve": "CVE-2016-6327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6327"
}
],
"notes": [
{
"category": "general",
"text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6327",
"url": "https://www.suse.com/security/cve/CVE-2016-6327"
},
{
"category": "external",
"summary": "SUSE Bug 994748 for CVE-2016-6327",
"url": "https://bugzilla.suse.com/994748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-6327"
},
{
"cve": "CVE-2016-6480",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6480"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6480",
"url": "https://www.suse.com/security/cve/CVE-2016-6480"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 991608 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991608"
},
{
"category": "external",
"summary": "SUSE Bug 991667 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/991667"
},
{
"category": "external",
"summary": "SUSE Bug 992568 for CVE-2016-6480",
"url": "https://bugzilla.suse.com/992568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-6480"
},
{
"cve": "CVE-2016-6828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6828"
}
],
"notes": [
{
"category": "general",
"text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6828",
"url": "https://www.suse.com/security/cve/CVE-2016-6828"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 994296 for CVE-2016-6828",
"url": "https://bugzilla.suse.com/994296"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-6828"
},
{
"cve": "CVE-2016-7042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7042"
}
],
"notes": [
{
"category": "general",
"text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7042",
"url": "https://www.suse.com/security/cve/CVE-2016-7042"
},
{
"category": "external",
"summary": "SUSE Bug 1004517 for CVE-2016-7042",
"url": "https://bugzilla.suse.com/1004517"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-7042"
},
{
"cve": "CVE-2016-7097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7097"
}
],
"notes": [
{
"category": "general",
"text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7097",
"url": "https://www.suse.com/security/cve/CVE-2016-7097"
},
{
"category": "external",
"summary": "SUSE Bug 1021258 for CVE-2016-7097",
"url": "https://bugzilla.suse.com/1021258"
},
{
"category": "external",
"summary": "SUSE Bug 1052256 for CVE-2016-7097",
"url": "https://bugzilla.suse.com/1052256"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-7097",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 995968 for CVE-2016-7097",
"url": "https://bugzilla.suse.com/995968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "low"
}
],
"title": "CVE-2016-7097"
},
{
"cve": "CVE-2016-7425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7425"
}
],
"notes": [
{
"category": "general",
"text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7425",
"url": "https://www.suse.com/security/cve/CVE-2016-7425"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 999932 for CVE-2016-7425",
"url": "https://bugzilla.suse.com/999932"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-7425"
},
{
"cve": "CVE-2016-8658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8658"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8658",
"url": "https://www.suse.com/security/cve/CVE-2016-8658"
},
{
"category": "external",
"summary": "SUSE Bug 1004462 for CVE-2016-8658",
"url": "https://bugzilla.suse.com/1004462"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-12-30T13:09:04Z",
"details": "moderate"
}
],
"title": "CVE-2016-8658"
}
]
}
SUSE-SU-2016:2629-1
Vulnerability from csaf_suse - Published: 2016-10-25 15:35 - Updated: 2016-10-25 15:35Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_25 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1546
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.51-60_25 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1546",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2629-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2629-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162629-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2629-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002353.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T15:35:17Z",
"generator": {
"date": "2016-10-25T15:35:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2629-1",
"initial_release_date": "2016-10-25T15:35:17Z",
"revision_history": [
{
"date": "2016-10-25T15:35:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:17Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:17Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2635-1
Vulnerability from csaf_suse - Published: 2016-10-25 21:18 - Updated: 2016-10-25 21:18Summary
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_41 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1549
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.59-60_41 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1549",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2635-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2635-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162635-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2635-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002359.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T21:18:23Z",
"generator": {
"date": "2016-10-25T21:18:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2635-1",
"initial_release_date": "2016-10-25T21:18:23Z",
"revision_history": [
{
"date": "2016-10-25T21:18:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64",
"product_id": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:23Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T21:18:23Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2630-1
Vulnerability from csaf_suse - Published: 2016-10-25 15:35 - Updated: 2016-10-25 15:35Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_20 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1547
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for the Linux Kernel 3.12.51-60_20 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Live-Patching-12-2016-1547",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2630-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2630-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162630-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2630-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002354.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001487",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "self",
"summary": "SUSE Bug 1004419",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8666 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8666/"
}
],
"title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1",
"tracking": {
"current_release_date": "2016-10-25T15:35:30Z",
"generator": {
"date": "2016-10-25T15:35:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2630-1",
"initial_release_date": "2016-10-25T15:35:30Z",
"revision_history": [
{
"date": "2016-10-25T15:35:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64",
"product_id": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12",
"product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:30Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
},
{
"cve": "CVE-2016-8666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8666"
}
],
"notes": [
{
"category": "general",
"text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8666",
"url": "https://www.suse.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "SUSE Bug 1001486 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001486"
},
{
"category": "external",
"summary": "SUSE Bug 1001487 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1001487"
},
{
"category": "external",
"summary": "SUSE Bug 1003964 for CVE-2016-8666",
"url": "https://bugzilla.suse.com/1003964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64",
"SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-25T15:35:30Z",
"details": "important"
}
],
"title": "CVE-2016-8666"
}
]
}
SUSE-SU-2016:2614-1
Vulnerability from csaf_suse - Published: 2016-10-24 11:29 - Updated: 2016-10-24 11:29Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
sleclo50sp3-kernel-source-12809,sleman21-kernel-source-12809,slemap21-kernel-source-12809,sleposp3-kernel-source-12809,slessp3-kernel-source-12809,slexsp3-kernel-source-12809
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sleclo50sp3-kernel-source-12809,sleman21-kernel-source-12809,slemap21-kernel-source-12809,sleposp3-kernel-source-12809,slessp3-kernel-source-12809,slexsp3-kernel-source-12809",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2614-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2614-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162614-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2614-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002349.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-10-24T11:29:13Z",
"generator": {
"date": "2016-10-24T11:29:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2614-1",
"initial_release_date": "2016-10-24T11:29:13Z",
"revision_history": [
{
"date": "2016-10-24T11:29:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.47.90.1.i586",
"product_id": "kernel-default-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.47.90.1.i586",
"product_id": "kernel-default-base-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.47.90.1.i586",
"product_id": "kernel-ec2-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.47.90.1.i586",
"product_id": "kernel-pae-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.47.90.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.47.90.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.47.90.1.i586",
"product_id": "kernel-source-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.47.90.1.i586",
"product_id": "kernel-syms-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.47.90.1.i586",
"product_id": "kernel-trace-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.47.90.1.i586",
"product_id": "kernel-xen-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.47.90.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.90.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.47.90.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-default-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-source-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-syms-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-trace-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.47.90.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.47.90.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-default-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-source-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.47.90.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 5",
"product": {
"name": "SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:cloud:5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager 2.1",
"product": {
"name": "SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:2.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 2.1",
"product": {
"name": "SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:2.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5",
"product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1",
"product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1",
"product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 2.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x",
"SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64",
"SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-24T11:29:13Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2596-1
Vulnerability from csaf_suse - Published: 2016-10-21 18:09 - Updated: 2016-10-21 18:09Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
slessp2-kernel-source-12807
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp2-kernel-source-12807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2596-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2596-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162596-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2596-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002347.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-10-21T18:09:49Z",
"generator": {
"date": "2016-10-21T18:09:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2596-1",
"initial_release_date": "2016-10-21T18:09:49Z",
"revision_history": [
{
"date": "2016-10-21T18:09:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-default-3.0.101-0.7.44.1.i586",
"product_id": "kernel-default-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-0.7.44.1.i586",
"product_id": "kernel-default-base-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.i586",
"product_id": "kernel-default-devel-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-0.7.44.1.i586",
"product_id": "kernel-ec2-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-0.7.44.1.i586",
"product_id": "kernel-ec2-base-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-pae-3.0.101-0.7.44.1.i586",
"product_id": "kernel-pae-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-0.7.44.1.i586",
"product_id": "kernel-pae-base-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-0.7.44.1.i586",
"product_id": "kernel-pae-devel-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-source-3.0.101-0.7.44.1.i586",
"product_id": "kernel-source-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-syms-3.0.101-0.7.44.1.i586",
"product_id": "kernel-syms-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-trace-3.0.101-0.7.44.1.i586",
"product_id": "kernel-trace-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.i586",
"product_id": "kernel-trace-base-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.i586",
"product_id": "kernel-trace-devel-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-xen-3.0.101-0.7.44.1.i586",
"product_id": "kernel-xen-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-0.7.44.1.i586",
"product_id": "kernel-xen-base-3.0.101-0.7.44.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.7.44.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-0.7.44.1.i586",
"product_id": "kernel-xen-devel-3.0.101-0.7.44.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-default-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-default-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-default-base-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-default-devel-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-default-man-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-source-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-source-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-syms-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-trace-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-trace-base-3.0.101-0.7.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-0.7.44.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-default-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-default-base-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-ec2-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-source-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-syms-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-trace-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-xen-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-0.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-default-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-default-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-pae-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-source-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-source-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-syms-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-trace-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-xen-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-0.7.44.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586",
"SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T18:09:49Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
SUSE-SU-2016:2593-1
Vulnerability from csaf_suse - Published: 2016-10-21 15:57 - Updated: 2016-10-21 15:57Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2016-1524,SUSE-SLE-SAP-12-2016-1524,SUSE-SLE-SERVER-12-2016-1524
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n\nThis non-security bug was fixed:\n\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Public-Cloud-12-2016-1524,SUSE-SLE-SAP-12-2016-1524,SUSE-SLE-SERVER-12-2016-1524",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2593-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2016:2593-1",
"url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162593-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2016:2593-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002346.html"
},
{
"category": "self",
"summary": "SUSE Bug 1001419",
"url": "https://bugzilla.suse.com/1001419"
},
{
"category": "self",
"summary": "SUSE Bug 1002165",
"url": "https://bugzilla.suse.com/1002165"
},
{
"category": "self",
"summary": "SUSE Bug 1004418",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "self",
"summary": "SUSE Bug 904970",
"url": "https://bugzilla.suse.com/904970"
},
{
"category": "self",
"summary": "SUSE Bug 907150",
"url": "https://bugzilla.suse.com/907150"
},
{
"category": "self",
"summary": "SUSE Bug 920615",
"url": "https://bugzilla.suse.com/920615"
},
{
"category": "self",
"summary": "SUSE Bug 920633",
"url": "https://bugzilla.suse.com/920633"
},
{
"category": "self",
"summary": "SUSE Bug 930408",
"url": "https://bugzilla.suse.com/930408"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5195 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5195/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2016-10-21T15:57:11Z",
"generator": {
"date": "2016-10-21T15:57:11Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2016:2593-1",
"initial_release_date": "2016-10-21T15:57:11Z",
"revision_history": [
{
"date": "2016-10-21T15:57:11Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.60-52.57.1.noarch",
"product": {
"name": "kernel-devel-3.12.60-52.57.1.noarch",
"product_id": "kernel-devel-3.12.60-52.57.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.60-52.57.1.noarch",
"product": {
"name": "kernel-macros-3.12.60-52.57.1.noarch",
"product_id": "kernel-macros-3.12.60-52.57.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.60-52.57.1.noarch",
"product": {
"name": "kernel-source-3.12.60-52.57.1.noarch",
"product_id": "kernel-source-3.12.60-52.57.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.60-52.57.1.ppc64le",
"product": {
"name": "kernel-default-3.12.60-52.57.1.ppc64le",
"product_id": "kernel-default-3.12.60-52.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.60-52.57.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.60-52.57.1.ppc64le",
"product_id": "kernel-default-base-3.12.60-52.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.60-52.57.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.60-52.57.1.ppc64le",
"product_id": "kernel-default-devel-3.12.60-52.57.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.60-52.57.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.60-52.57.1.ppc64le",
"product_id": "kernel-syms-3.12.60-52.57.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.60-52.57.1.s390x",
"product": {
"name": "kernel-default-3.12.60-52.57.1.s390x",
"product_id": "kernel-default-3.12.60-52.57.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.60-52.57.1.s390x",
"product": {
"name": "kernel-default-base-3.12.60-52.57.1.s390x",
"product_id": "kernel-default-base-3.12.60-52.57.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.60-52.57.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.60-52.57.1.s390x",
"product_id": "kernel-default-devel-3.12.60-52.57.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.60-52.57.1.s390x",
"product": {
"name": "kernel-default-man-3.12.60-52.57.1.s390x",
"product_id": "kernel-default-man-3.12.60-52.57.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.60-52.57.1.s390x",
"product": {
"name": "kernel-syms-3.12.60-52.57.1.s390x",
"product_id": "kernel-syms-3.12.60-52.57.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-ec2-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.60-52.57.1.x86_64",
"product_id": "kernel-ec2-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-default-3.12.60-52.57.1.x86_64",
"product_id": "kernel-default-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.60-52.57.1.x86_64",
"product_id": "kernel-default-base-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.60-52.57.1.x86_64",
"product_id": "kernel-default-devel-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-syms-3.12.60-52.57.1.x86_64",
"product_id": "kernel-syms-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-xen-3.12.60-52.57.1.x86_64",
"product_id": "kernel-xen-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.60-52.57.1.x86_64",
"product_id": "kernel-xen-base-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.60-52.57.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.60-52.57.1.x86_64",
"product_id": "kernel-xen-devel-3.12.60-52.57.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"product_id": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-devel-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-macros-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-source-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-syms-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le"
},
"product_reference": "kernel-default-3.12.60-52.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x"
},
"product_reference": "kernel-default-3.12.60-52.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.60-52.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x"
},
"product_reference": "kernel-default-base-3.12.60-52.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.60-52.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.60-52.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x"
},
"product_reference": "kernel-default-man-3.12.60-52.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-devel-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-macros-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch"
},
"product_reference": "kernel-source-3.12.60-52.57.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.60-52.57.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x"
},
"product_reference": "kernel-syms-3.12.60-52.57.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-syms-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.60-52.57.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-5195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5195"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5195",
"url": "https://www.suse.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "SUSE Bug 1004418 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004418"
},
{
"category": "external",
"summary": "SUSE Bug 1004419 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004419"
},
{
"category": "external",
"summary": "SUSE Bug 1004436 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1004436"
},
{
"category": "external",
"summary": "SUSE Bug 1006323 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006323"
},
{
"category": "external",
"summary": "SUSE Bug 1006695 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1006695"
},
{
"category": "external",
"summary": "SUSE Bug 1007291 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1007291"
},
{
"category": "external",
"summary": "SUSE Bug 1008110 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1008110"
},
{
"category": "external",
"summary": "SUSE Bug 1030118 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1030118"
},
{
"category": "external",
"summary": "SUSE Bug 1046453 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1046453"
},
{
"category": "external",
"summary": "SUSE Bug 1069496 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1069496"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 986445 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/986445"
},
{
"category": "external",
"summary": "SUSE Bug 998689 for CVE-2016-5195",
"url": "https://bugzilla.suse.com/998689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2016-10-21T15:57:11Z",
"details": "important"
}
],
"title": "CVE-2016-5195"
}
]
}
RHSA-2016:2105
Vulnerability from csaf_redhat - Published: 2016-10-26 11:42 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2105",
"url": "https://access.redhat.com/errata/RHSA-2016:2105"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2105.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:02+00:00",
"generator": {
"date": "2025-11-21T17:58:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2105",
"initial_release_date": "2016-10-26T11:42:28+00:00",
"revision_history": [
{
"date": "2016-10-26T11:42:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T11:42:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.i686",
"product_id": "perf-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.src",
"product_id": "kernel-0:2.6.32-642.6.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.6.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.6.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.6.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x",
"product_id": "perf-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.6.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T11:42:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2105"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2126
Vulnerability from csaf_redhat - Published: 2016-10-31 11:30 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2126",
"url": "https://access.redhat.com/errata/RHSA-2016:2126"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2126.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:49:42+00:00",
"generator": {
"date": "2024-11-14T20:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2126",
"initial_release_date": "2016-10-31T11:30:06+00:00",
"revision_history": [
{
"date": "2016-10-31T11:30:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T11:30:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.32.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.src",
"product_id": "kernel-0:2.6.18-348.32.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T11:30:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2126"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2098
Vulnerability from csaf_redhat - Published: 2016-10-24 13:31 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2098",
"url": "https://access.redhat.com/errata/RHSA-2016:2098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2098.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:00+00:00",
"generator": {
"date": "2025-11-21T17:58:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2098",
"initial_release_date": "2016-10-24T13:31:27+00:00",
"revision_history": [
{
"date": "2016-10-24T13:31:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-24T13:31:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "perf-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.36.3.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.36.3.el7.src",
"product_id": "kernel-0:3.10.0-327.36.3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.36.3.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.36.3.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"product_id": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x",
"product_id": "perf-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-327.36.3.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-327.36.3.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "perf-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.2.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-24T13:31:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2098"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src",
"7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x",
"7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2118
Vulnerability from csaf_redhat - Published: 2016-10-26 18:43 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2118",
"url": "https://access.redhat.com/errata/RHSA-2016:2118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2118.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:05+00:00",
"generator": {
"date": "2025-11-21T17:58:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2118",
"initial_release_date": "2016-10-26T18:43:44+00:00",
"revision_history": [
{
"date": "2016-10-26T18:43:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T18:43:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.ael7b?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product_id": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.ael7b?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.src",
"product_id": "kernel-0:3.10.0-229.42.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product_id": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x",
"product_id": "perf-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T18:43:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2118"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2132
Vulnerability from csaf_redhat - Published: 2016-11-01 13:24 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Bug Fix(es):
* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode-\u003enpages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2132",
"url": "https://access.redhat.com/errata/RHSA-2016:2132"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2132.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T20:49:54+00:00",
"generator": {
"date": "2024-11-14T20:49:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2132",
"initial_release_date": "2016-11-01T13:24:02+00:00",
"revision_history": [
{
"date": "2016-11-01T13:24:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-11-01T13:24:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.68.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-220.68.1.el6.src",
"product_id": "kernel-0:2.6.32-220.68.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.68.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.68.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T13:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2132"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2124
Vulnerability from csaf_redhat - Published: 2016-10-28 09:28 - Updated: 2024-11-22 10:23Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)
* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* In some cases, a kernel crash or file system corruption occurred when running journal mode \u0027ordered\u0027. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)\n\n* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2124",
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1344721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2124.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T10:23:31+00:00",
"generator": {
"date": "2024-11-22T10:23:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2124",
"initial_release_date": "2016-10-28T09:28:10+00:00",
"revision_history": [
{
"date": "2016-10-28T09:28:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-28T09:28:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T10:23:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-0:2.6.18-416.el5.i686",
"product_id": "kernel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.i386",
"product_id": "kernel-headers-0:2.6.18-416.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.src",
"product": {
"name": "kernel-0:2.6.18-416.el5.src",
"product_id": "kernel-0:2.6.18-416.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-416.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-416.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-416.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-416.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src"
},
"product_reference": "kernel-0:2.6.18-416.el5.src",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-416.el5.noarch",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.i386",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src"
},
"product_reference": "kernel-0:2.6.18-416.el5.src",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-416.el5.noarch",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.i386",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1583",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2016-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1344721"
}
],
"notes": [
{
"category": "description",
"text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1583"
},
{
"category": "external",
"summary": "RHBZ#1344721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1583"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583"
}
],
"release_date": "2016-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-28T09:28:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ"
},
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-28T09:28:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2127
Vulnerability from csaf_redhat - Published: 2016-10-31 11:29 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2127",
"url": "https://access.redhat.com/errata/RHSA-2016:2127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2127.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:06+00:00",
"generator": {
"date": "2025-11-21T17:58:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2127",
"initial_release_date": "2016-10-31T11:29:55+00:00",
"revision_history": [
{
"date": "2016-10-31T11:29:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T11:29:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:5.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.src",
"product_id": "kernel-0:2.6.18-238.57.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.57.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.src",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T11:29:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2127"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2106
Vulnerability from csaf_redhat - Published: 2016-10-26 09:07 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2106",
"url": "https://access.redhat.com/errata/RHSA-2016:2106"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2106.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:02+00:00",
"generator": {
"date": "2025-11-21T17:58:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2106",
"initial_release_date": "2016-10-26T09:07:07+00:00",
"revision_history": [
{
"date": "2016-10-26T09:07:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T09:07:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.i686",
"product_id": "perf-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.35.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.35.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.35.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.src",
"product_id": "kernel-0:2.6.32-573.35.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x",
"product_id": "perf-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T09:07:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2106"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2107
Vulnerability from csaf_redhat - Published: 2016-10-26 10:47 - Updated: 2024-11-14 21:41Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2107",
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2107.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-14T21:41:27+00:00",
"generator": {
"date": "2024-11-14T21:41:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2107",
"initial_release_date": "2016-10-26T10:47:33+00:00",
"revision_history": [
{
"date": "2016-10-26T10:47:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T10:47:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T21:41:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016_2133
Vulnerability from csaf_redhat - Published: 2016-11-01 10:58 - Updated: 2024-11-14 20:50Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2133",
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2133.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:50:14+00:00",
"generator": {
"date": "2024-11-14T20:50:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2133",
"initial_release_date": "2016-11-01T10:58:08+00:00",
"revision_history": [
{
"date": "2016-11-01T10:58:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-11-01T10:58:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:50:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.75.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.75.1.el6.src",
"product_id": "kernel-0:2.6.32-358.75.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.75.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.75.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"David Howells"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2016-4470",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"discovery_date": "2016-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1341716"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4470"
},
{
"category": "external",
"summary": "RHBZ#1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470"
}
],
"release_date": "2016-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T10:58:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path"
},
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T10:58:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2127
Vulnerability from csaf_redhat - Published: 2016-10-31 11:29 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2127",
"url": "https://access.redhat.com/errata/RHSA-2016:2127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2127.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:49:46+00:00",
"generator": {
"date": "2024-11-14T20:49:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2127",
"initial_release_date": "2016-10-31T11:29:55+00:00",
"revision_history": [
{
"date": "2016-10-31T11:29:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T11:29:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:5.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.src",
"product_id": "kernel-0:2.6.18-238.57.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.57.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.src",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.i386",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T11:29:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2127"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src",
"5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64",
"5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2120
Vulnerability from csaf_redhat - Published: 2016-10-27 09:08 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2120",
"url": "https://access.redhat.com/errata/RHSA-2016:2120"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2120.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:05+00:00",
"generator": {
"date": "2025-11-21T17:58:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2120",
"initial_release_date": "2016-10-27T09:08:14+00:00",
"revision_history": [
{
"date": "2016-10-27T09:08:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-27T09:08:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "perf-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.75.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.75.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.75.1.el6.src",
"product_id": "kernel-0:2.6.32-431.75.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.75.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.75.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.75.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.75.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.src",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-27T09:08:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2120"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src",
"6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch",
"6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64",
"6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2107
Vulnerability from csaf_redhat - Published: 2016-10-26 10:47 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2107",
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2107.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:02+00:00",
"generator": {
"date": "2025-11-21T17:58:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2107",
"initial_release_date": "2016-10-26T10:47:33+00:00",
"revision_history": [
{
"date": "2016-10-26T10:47:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T10:47:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T10:47:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2107"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016:2132
Vulnerability from csaf_redhat - Published: 2016-11-01 13:24 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Bug Fix(es):
* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode-\u003enpages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2132",
"url": "https://access.redhat.com/errata/RHSA-2016:2132"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2132.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:58:07+00:00",
"generator": {
"date": "2025-11-21T17:58:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2132",
"initial_release_date": "2016-11-01T13:24:02+00:00",
"revision_history": [
{
"date": "2016-11-01T13:24:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-11-01T13:24:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "perf-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.68.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-220.68.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-220.68.1.el6.src",
"product_id": "kernel-0:2.6.32-220.68.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.68.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.68.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T13:24:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2132"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src",
"6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch",
"6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64",
"6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2133
Vulnerability from csaf_redhat - Published: 2016-11-01 10:58 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2133",
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2133.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:08+00:00",
"generator": {
"date": "2025-11-21T17:58:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2133",
"initial_release_date": "2016-11-01T10:58:08+00:00",
"revision_history": [
{
"date": "2016-11-01T10:58:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-11-01T10:58:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "perf-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.75.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.75.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-358.75.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-358.75.1.el6.src",
"product_id": "kernel-0:2.6.32-358.75.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.75.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.75.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"David Howells"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2016-4470",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"discovery_date": "2016-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1341716"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4470"
},
{
"category": "external",
"summary": "RHBZ#1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470"
}
],
"release_date": "2016-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T10:58:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path"
},
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-11-01T10:58:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2133"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src",
"6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch",
"6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64",
"6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2017_0372
Vulnerability from csaf_redhat - Published: 2017-03-02 17:04 - Updated: 2024-11-14 21:42Summary
Red Hat Security Advisory: kernel-aarch64 security and bug fix update
Notes
Topic
An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)
* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)\n\n* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0372",
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0372.json"
}
],
"title": "Red Hat Security Advisory: kernel-aarch64 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T21:42:34+00:00",
"generator": {
"date": "2024-11-14T21:42:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2017:0372",
"initial_release_date": "2017-03-02T17:04:41+00:00",
"revision_history": [
{
"date": "2017-03-02T17:04:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-03-02T17:04:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T21:42:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.5.0-15.2.1.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product_id": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-aarch64@4.5.0-15.2.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src"
},
"product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src"
},
"product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016:2124
Vulnerability from csaf_redhat - Published: 2016-10-28 09:28 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)
* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* In some cases, a kernel crash or file system corruption occurred when running journal mode \u0027ordered\u0027. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)\n\n* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2124",
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1344721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2124.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:58:05+00:00",
"generator": {
"date": "2025-11-21T17:58:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2124",
"initial_release_date": "2016-10-28T09:28:10+00:00",
"revision_history": [
{
"date": "2016-10-28T09:28:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-28T09:28:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-416.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-0:2.6.18-416.el5.i686",
"product_id": "kernel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.i386",
"product_id": "kernel-headers-0:2.6.18-416.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.src",
"product": {
"name": "kernel-0:2.6.18-416.el5.src",
"product_id": "kernel-0:2.6.18-416.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-416.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-416.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-416.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-416.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-416.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-416.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product_id": "kernel-kdump-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-416.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-416.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src"
},
"product_reference": "kernel-0:2.6.18-416.el5.src",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-416.el5.noarch",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.i386",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src"
},
"product_reference": "kernel-0:2.6.18-416.el5.src",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-416.el5.noarch",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.i386",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-1583",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2016-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1344721"
}
],
"notes": [
{
"category": "description",
"text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-1583"
},
{
"category": "external",
"summary": "RHBZ#1344721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1583"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583"
}
],
"release_date": "2016-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-28T09:28:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ"
},
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-28T09:28:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2124"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.src",
"5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64",
"5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64",
"5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2110
Vulnerability from csaf_redhat - Published: 2016-10-26 12:21 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2110",
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2110.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:02+00:00",
"generator": {
"date": "2025-11-21T17:58:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2110",
"initial_release_date": "2016-10-26T12:21:02+00:00",
"revision_history": [
{
"date": "2016-10-26T12:21:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T12:21:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.36.3.rt56.238.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016_2105
Vulnerability from csaf_redhat - Published: 2016-10-26 11:42 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2105",
"url": "https://access.redhat.com/errata/RHSA-2016:2105"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2105.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:49:50+00:00",
"generator": {
"date": "2024-11-14T20:49:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2105",
"initial_release_date": "2016-10-26T11:42:28+00:00",
"revision_history": [
{
"date": "2016-10-26T11:42:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T11:42:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "perf-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.i686",
"product_id": "perf-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.src",
"product_id": "kernel-0:2.6.32-642.6.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.6.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.6.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.6.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x",
"product_id": "perf-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.6.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "perf-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.6.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.8.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T11:42:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2105"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src",
"6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x",
"6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2017:0372
Vulnerability from csaf_redhat - Published: 2017-03-02 17:04 - Updated: 2025-11-21 17:59Summary
Red Hat Security Advisory: kernel-aarch64 security and bug fix update
Notes
Topic
An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)
* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)\n\n* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:0372",
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0372.json"
}
],
"title": "Red Hat Security Advisory: kernel-aarch64 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:59:40+00:00",
"generator": {
"date": "2025-11-21T17:59:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:0372",
"initial_release_date": "2017-03-02T17:04:41+00:00",
"revision_history": [
{
"date": "2017-03-02T17:04:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-03-02T17:04:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:59:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "perf-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.5.0-15.2.1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product_id": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.5.0-15.2.1.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product_id": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-aarch64@4.5.0-15.2.1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src"
},
"product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src"
},
"product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
},
"product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-03-02T17:04:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:0372"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src",
"7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64",
"7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016_2118
Vulnerability from csaf_redhat - Published: 2016-10-26 18:43 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2118",
"url": "https://access.redhat.com/errata/RHSA-2016:2118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2118.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:49:27+00:00",
"generator": {
"date": "2024-11-14T20:49:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2118",
"initial_release_date": "2016-10-26T18:43:44+00:00",
"revision_history": [
{
"date": "2016-10-26T18:43:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T18:43:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.1::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "perf-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.ael7b?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product_id": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.ael7b?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.src",
"product_id": "kernel-0:3.10.0-229.42.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product_id": "kernel-0:3.10.0-229.42.2.ael7b.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x",
"product_id": "perf-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-229.42.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "perf-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_id": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.ael7b?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)",
"product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)",
"product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)",
"product_id": "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.1.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src"
},
"product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)",
"product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T18:43:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2118"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src",
"7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x",
"7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src",
"7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch",
"7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le",
"7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2106
Vulnerability from csaf_redhat - Published: 2016-10-26 09:07 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2106",
"url": "https://access.redhat.com/errata/RHSA-2016:2106"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2106.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-14T20:49:56+00:00",
"generator": {
"date": "2024-11-14T20:49:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2106",
"initial_release_date": "2016-10-26T09:07:07+00:00",
"revision_history": [
{
"date": "2016-10-26T09:07:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T09:07:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "perf-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686",
"product_id": "kernel-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.i686",
"product_id": "perf-0:2.6.32-573.35.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.35.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.35.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.35.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.src",
"product_id": "kernel-0:2.6.32-573.35.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x",
"product_id": "perf-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.35.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product_id": "perf-0:2.6.32-573.35.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T09:07:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2106"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src",
"6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x",
"6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016:2126
Vulnerability from csaf_redhat - Published: 2016-10-31 11:30 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2126",
"url": "https://access.redhat.com/errata/RHSA-2016:2126"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2126.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:58:05+00:00",
"generator": {
"date": "2025-11-21T17:58:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2126",
"initial_release_date": "2016-10-31T11:30:06+00:00",
"revision_history": [
{
"date": "2016-10-31T11:30:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T11:30:06+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product_id": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.32.1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-348.32.1.el5.src",
"product": {
"name": "kernel-0:2.6.18-348.32.1.el5.src",
"product_id": "kernel-0:2.6.18-348.32.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T11:30:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2126"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src",
"5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386",
"5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686",
"5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2128
Vulnerability from csaf_redhat - Published: 2016-10-31 16:01 - Updated: 2024-11-14 20:49Summary
Red Hat Security Advisory: kernel security and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Enhancement(s):
* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).\n\nEnhancement(s):\n\n* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2128",
"url": "https://access.redhat.com/errata/RHSA-2016:2128"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2128.json"
}
],
"title": "Red Hat Security Advisory: kernel security and enhancement update",
"tracking": {
"current_release_date": "2024-11-14T20:49:58+00:00",
"generator": {
"date": "2024-11-14T20:49:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2128",
"initial_release_date": "2016-10-31T16:01:35+00:00",
"revision_history": [
{
"date": "2016-10-31T16:01:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T16:01:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T20:49:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.i686",
"product_id": "perf-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.54.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.54.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.54.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.src",
"product_id": "kernel-0:2.6.32-504.54.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x",
"product_id": "perf-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"David Howells"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2016-4470",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"discovery_date": "2016-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1341716"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-4470"
},
{
"category": "external",
"summary": "RHBZ#1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4470"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470"
}
],
"release_date": "2016-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T16:01:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2128"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path"
},
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-31T16:01:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2128"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src",
"6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
}
]
}
RHSA-2016_2110
Vulnerability from csaf_redhat - Published: 2016-10-26 12:21 - Updated: 2024-11-14 21:41Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2110",
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2110.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-14T21:41:22+00:00",
"generator": {
"date": "2024-11-14T21:41:22+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2016:2110",
"initial_release_date": "2016-10-26T12:21:02+00:00",
"revision_history": [
{
"date": "2016-10-26T12:21:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-26T12:21:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T21:41:22+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.36.3.rt56.238.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.2.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Phil Oester"
]
}
],
"cve": "CVE-2016-5195",
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384344"
}
],
"notes": [
{
"category": "description",
"text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-5195"
},
{
"category": "external",
"summary": "RHBZ#1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2016-10-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
},
{
"category": "workaround",
"details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-03-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage"
},
{
"cve": "CVE-2016-7039",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-09-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1375944"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-7039"
},
{
"category": "external",
"summary": "RHBZ#1375944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7039"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039"
}
],
"release_date": "2016-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash"
},
{
"cve": "CVE-2016-8666",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2016-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1384991"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2016-8666"
},
{
"category": "external",
"summary": "RHBZ#1384991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666"
}
],
"release_date": "2016-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2016-10-26T12:21:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2016:2110"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src",
"7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch",
"7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64",
"7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash"
}
]
}
RHSA-2016:2128
Vulnerability from csaf_redhat - Published: 2016-10-31 16:01 - Updated: 2025-11-21 17:58Summary
Red Hat Security Advisory: kernel security and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Enhancement(s):
* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).\n\nEnhancement(s):\n\n* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2016:2128",
"url": "https://access.redhat.com/errata/RHSA-2016:2128"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/2706661",
"url": "https://access.redhat.com/security/vulnerabilities/2706661"
},
{
"category": "external",
"summary": "1341716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716"
},
{
"category": "external",
"summary": "1384344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2128.json"
}
],
"title": "Red Hat Security Advisory: kernel security and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:58:06+00:00",
"generator": {
"date": "2025-11-21T17:58:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2016:2128",
"initial_release_date": "2016-10-31T16:01:35+00:00",
"revision_history": [
{
"date": "2016-10-31T16:01:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2016-10-31T16:01:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:58:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686",
"product_id": "kernel-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.i686",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.i686",
"product_id": "perf-0:2.6.32-504.54.1.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "perf-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.54.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.54.1.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.54.1.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.src",
"product_id": "kernel-0:2.6.32-504.54.1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x",
"product_id": "perf-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-504.54.1.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product_id": "perf-0:2.6.32-504.54.1.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)",
"product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)",
"product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)",
"product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",
"product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)",