Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7895
Vulnerability from cvelistv5
Published
2017-04-28 10:00
Modified
2024-08-05 16:19
Severity ?
EPSS score ?
Summary
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:19:29.273Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:2732", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2732" }, { "name": "RHSA-2017:2412", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2412" }, { "name": "RHSA-2017:1798", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1798" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "RHSA-2017:1723", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "name": "RHSA-2017:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "RHSA-2017:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1766" }, { "name": "RHSA-2017:1616", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:2429", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "DSA-3886", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:2428", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2428" }, { "name": "98085", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/98085" }, { "name": "RHSA-2017:2472", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "name": "RHSA-2017:1715", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:1715" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-04-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2017:2732", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2732" }, { "name": "RHSA-2017:2412", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2412" }, { "name": "RHSA-2017:1798", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1798" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "RHSA-2017:1723", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "name": "RHSA-2017:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "RHSA-2017:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1766", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1766" }, { "name": "RHSA-2017:1616", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:2429", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "DSA-3886", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:2428", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2428" }, { "name": "98085", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/98085" }, { "name": "RHSA-2017:2472", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "name": "RHSA-2017:1715", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:1715" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:2732", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2732" }, { "name": "RHSA-2017:2412", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2412" }, { "name": "RHSA-2017:1798", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1798" }, { "name": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "RHSA-2017:1723", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1766", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1766" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:2429", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "DSA-3886", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:2428", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2428" }, { "name": "98085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98085" }, { "name": "RHSA-2017:2472", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "name": "RHSA-2017:1715", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1715" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-7895", "datePublished": "2017-04-28T10:00:00", "dateReserved": "2017-04-18T00:00:00", "dateUpdated": "2024-08-05T16:19:29.273Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-7895\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-04-28T10:59:00.160\",\"lastModified\":\"2024-11-21T03:32:54.943\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.\"},{\"lang\":\"es\",\"value\":\"Las implementaciones de los servidores NFSv2 y NFSv3 en versiones del kernel de Linux 4.10.13 y anteriores, no realizan ciertas comprobaciones de la parte final de un b\u00fafer lo que permitir\u00eda a atacantes remotos desencadenar errores de aritm\u00e9tica de punteros o provocar otro impacto inespec\u00edfico a trav\u00e9s de peticiones especialmente dise\u00f1adas. Relacionado con fs/nfsd/nfs3xdr.c y fs/nfsd/nfsxdr.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.89\",\"matchCriteriaId\":\"9A5C1F01-214B-4477-A3A1-F6DF10181D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.16.44\",\"matchCriteriaId\":\"8C1901E2-6C4D-488B-A7CE-F7E14A38418F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17.0\",\"versionEndExcluding\":\"4.1.40\",\"matchCriteriaId\":\"CBDB1D3B-CDD5-48F2-83E3-33F072B455B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.67\",\"matchCriteriaId\":\"168D3A9F-B199-4E02-B791-291B29317EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5.0\",\"versionEndExcluding\":\"4.9.26\",\"matchCriteriaId\":\"8244943C-198B-43B2-B79C-C832E4572949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10\",\"versionEndExcluding\":\"4.10.14\",\"matchCriteriaId\":\"90895EF1-9DC7-4E47-A937-405661F7A44B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98085\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1615\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1616\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1647\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1715\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1723\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1766\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1798\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2412\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2428\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2429\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2472\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2732\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1615\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1647\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1723\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2412\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2428\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2429\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2472\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2732\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
gsd-2017-7895
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-7895", "description": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "id": "GSD-2017-7895", "references": [ "https://www.suse.com/security/cve/CVE-2017-7895.html", "https://www.debian.org/security/2017/dsa-3886", "https://access.redhat.com/errata/RHSA-2017:2732", "https://access.redhat.com/errata/RHSA-2017:2472", "https://access.redhat.com/errata/RHSA-2017:2429", "https://access.redhat.com/errata/RHSA-2017:2428", "https://access.redhat.com/errata/RHSA-2017:2412", "https://access.redhat.com/errata/RHSA-2017:1798", "https://access.redhat.com/errata/RHSA-2017:1766", "https://access.redhat.com/errata/RHSA-2017:1723", "https://access.redhat.com/errata/RHSA-2017:1715", "https://access.redhat.com/errata/RHSA-2017:1647", "https://access.redhat.com/errata/RHSA-2017:1616", "https://access.redhat.com/errata/RHSA-2017:1615", "https://ubuntu.com/security/CVE-2017-7895", "https://advisories.mageia.org/CVE-2017-7895.html", "https://linux.oracle.com/cve/CVE-2017-7895.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-7895" ], "details": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "id": "GSD-2017-7895", "modified": "2023-12-13T01:21:06.374381Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:2732", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2732" }, { "name": "RHSA-2017:2412", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2412" }, { "name": "RHSA-2017:1798", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1798" }, { "name": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "RHSA-2017:1723", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1615" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1766", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1766" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:2429", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "DSA-3886", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:2428", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2428" }, { "name": "98085", "refsource": "BID", "url": "http://www.securityfocus.com/bid/98085" }, { "name": "RHSA-2017:2472", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "name": "RHSA-2017:1715", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:1715" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.89", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.44", "versionStartIncluding": "3.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.40", "versionStartIncluding": "3.17.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.67", "versionStartIncluding": "4.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.9.26", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.10.14", "versionStartIncluding": "4.10", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-7895" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309" }, { "name": "98085", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/98085" }, { "name": "DSA-3886", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2017/dsa-3886" }, { "name": "RHSA-2017:2732", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2732" }, { "name": "RHSA-2017:2472", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "name": "RHSA-2017:2429", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "name": "RHSA-2017:2428", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2428" }, { "name": "RHSA-2017:2412", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2412" }, { "name": "RHSA-2017:1798", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1798" }, { "name": "RHSA-2017:1766", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1766" }, { "name": "RHSA-2017:1723", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "name": "RHSA-2017:1715", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1715" }, { "name": "RHSA-2017:1647", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1647" }, { "name": "RHSA-2017:1616", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "name": "RHSA-2017:1615", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:1615" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-19T16:13Z", "publishedDate": "2017-04-28T10:59Z" } } }
rhsa-2017:1616
Vulnerability from csaf_redhat
Published
2017-06-28 16:57
Modified
2024-11-14 23:34
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)
* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)\n\n* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)\n\n* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1616", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "1452742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452742" }, { "category": "external", "summary": "1455239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455239" }, { "category": "external", "summary": "1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1616.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:34:54+00:00", "generator": { "date": "2024-11-14T23:34:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:1616", "initial_release_date": "2017-06-28T16:57:58+00:00", "revision_history": [ { "date": "2017-06-28T16:57:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T16:57:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:34:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.26.1.rt56.442.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xiaohan Zhang" ], "organization": "Huawei Inc." } ], "cve": "CVE-2017-2583", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1414735" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7\nmay address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "RHBZ#1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583" } ], "release_date": "2017-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest" }, { "cve": "CVE-2017-6214", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1426542" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "RHBZ#1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6214", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214" } ], "release_date": "2017-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()" }, { "cve": "CVE-2017-7477", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1445207" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 starting with the version kernel-3.10.0-514.el7, that is with Red Hat Enterprise Linux 7.3 GA. Prior Red Hat Enterprise Linux 7 kernel versions are not affected.\n\nIn order to exploit this issue, the system needs to be manually configured by privileged user. The default Red Hat Enterprise Linux 7 configuration is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7477" }, { "category": "external", "summary": "RHBZ#1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7477", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477" } ], "release_date": "2017-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "workaround", "details": "Red Hat recommends blacklisting the kernel module to prevent its use. This will prevent accidental version loading by administration and also mitigate the flaw if a kernel with the affected module is booted.\n\nAs the macsec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nRaw\n\n # echo \"install macsec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-macsec.conf \n\nIf macsec functionality is in use as a functional part of the system a kernel upgrade is required.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2017-1000364", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1461333" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap/stack gap jumping via unbounded stack allocations", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "RHBZ#1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000364", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/stackguard", "url": "https://access.redhat.com/security/vulnerabilities/stackguard" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap/stack gap jumping via unbounded stack allocations" }, { "acknowledgments": [ { "names": [ "Qualys Inc" ] } ], "cve": "CVE-2017-1000379", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1462165" } ], "notes": [ { "category": "description", "text": "The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrectly mapped contents of PIE executable", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw. This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2. This issue is currently fixed in most versions of shipping products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000379" }, { "category": "external", "summary": "RHBZ#1462165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000379", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Incorrectly mapped contents of PIE executable" } ] }
rhsa-2017:1723
Vulnerability from csaf_redhat
Published
2017-07-11 18:45
Modified
2024-11-14 23:35
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
Red Hat would like to thank Ari Kauppi for reporting this issue.
Bug Fix(es):
* If several file operations were started after a mounted NFS share had got idle and its Transmission Control Protocol (TCP) connection had therefore been terminated, these operations could cause multiple TCP SYN packets coming from the NFS client instead of one. With this update, the reconnection logic has been fixed, and only one TCP SYN packet is now sent in the described situation. (BZ#1450850)
* When the ixgbe driver was loaded for a backplane-connected network card, a kernel panic could occur, because the ops.setup_fc function pointer was used before the initialization. With this update, ops.setup_fc is initialized earlier. As a result, ixgbe no longer panics on load. (BZ#1457347)
* When setting an Access Control List (ACL) with 190 and more Access Control Entries (ACEs) on a NFSv4 directory, a kernel crash could previously occur. This update fixes the nfs4_getfacl() function, and the kernel no longer crashes under the described circumstances. (BZ#1449096)
* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1466667)
* When a program receives IPv6 packets using the raw socket, the ioctl(FIONREAD) and ioctl(SIOCINQ) functions can incorrectly return zero waiting bytes. This update fixes the ip6_input_finish() function to check the raw payload size properly. As a result, the ioctl() function now returns bytes waiting in the raw socket correctly. (BZ#1450870)
* Previously, listing a directory on a non-standard XFS filesystem (with non-default multi-fsb directory blocks) could lead to a soft lock up due to array index overrun in the xfs_dir2_leaf_readbuf() function. This update fixes xfs_dir2_leaf_readbuf(), and the soft lock up no longer occurs under the described circumstances. (BZ#1445179)
* Previously, aborts from the array after the Storage Area Network (SAN) fabric back-pressure led to premature reuse of still valid sequence with the same OX_ID. Consequently, an error message and data corruption could occur. This update fixes the libfc driver to isolate the timed out OX_IDs, thus fixing this bug. (BZ#1455550)
* Previously, a kernel panic occurred when the mcelog daemon executed a huge page memory offline. This update fixes the HugeTLB feature of the Linux kernel to check for the Page Table Entry (PTE) NULL pointer in the page_check_address() function. As a result, the kernel panic no longer occurs under the described circumstances. (BZ#1444351)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\nRed Hat would like to thank Ari Kauppi for reporting this issue.\n\nBug Fix(es):\n\n* If several file operations were started after a mounted NFS share had got idle and its Transmission Control Protocol (TCP) connection had therefore been terminated, these operations could cause multiple TCP SYN packets coming from the NFS client instead of one. With this update, the reconnection logic has been fixed, and only one TCP SYN packet is now sent in the described situation. (BZ#1450850)\n\n* When the ixgbe driver was loaded for a backplane-connected network card, a kernel panic could occur, because the ops.setup_fc function pointer was used before the initialization. With this update, ops.setup_fc is initialized earlier. As a result, ixgbe no longer panics on load. (BZ#1457347)\n\n* When setting an Access Control List (ACL) with 190 and more Access Control Entries (ACEs) on a NFSv4 directory, a kernel crash could previously occur. This update fixes the nfs4_getfacl() function, and the kernel no longer crashes under the described circumstances. (BZ#1449096)\n\n* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1466667)\n\n* When a program receives IPv6 packets using the raw socket, the ioctl(FIONREAD) and ioctl(SIOCINQ) functions can incorrectly return zero waiting bytes. This update fixes the ip6_input_finish() function to check the raw payload size properly. As a result, the ioctl() function now returns bytes waiting in the raw socket correctly. (BZ#1450870)\n\n* Previously, listing a directory on a non-standard XFS filesystem (with non-default multi-fsb directory blocks) could lead to a soft lock up due to array index overrun in the xfs_dir2_leaf_readbuf() function. This update fixes xfs_dir2_leaf_readbuf(), and the soft lock up no longer occurs under the described circumstances. (BZ#1445179)\n\n* Previously, aborts from the array after the Storage Area Network (SAN) fabric back-pressure led to premature reuse of still valid sequence with the same OX_ID. Consequently, an error message and data corruption could occur. This update fixes the libfc driver to isolate the timed out OX_IDs, thus fixing this bug. (BZ#1455550)\n\n* Previously, a kernel panic occurred when the mcelog daemon executed a huge page memory offline. This update fixes the HugeTLB feature of the Linux kernel to check for the Page Table Entry (PTE) NULL pointer in the page_check_address() function. As a result, the kernel panic no longer occurs under the described circumstances. (BZ#1444351)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1723", "url": "https://access.redhat.com/errata/RHSA-2017:1723" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1723.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:35:08+00:00", "generator": { "date": "2024-11-14T23:35:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:1723", "initial_release_date": "2017-07-11T18:45:35+00:00", "revision_history": [ { "date": "2017-07-11T18:45:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-07-11T18:45:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:35:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "product_id": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.6.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.6.3.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.6.3.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64", "product_id": "perf-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.6.3.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "product_id": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.6.3.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.6.3.el6.i686", "product": { "name": "perf-0:2.6.32-696.6.3.el6.i686", "product_id": "perf-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "product_id": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.6.3.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.6.3.el6.i686", "product": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686", "product_id": "python-perf-0:2.6.32-696.6.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.6.3.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-696.6.3.el6.src", "product": { "name": "kernel-0:2.6.32-696.6.3.el6.src", "product_id": "kernel-0:2.6.32-696.6.3.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.6.3.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x", "product_id": "python-perf-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "perf-0:2.6.32-696.6.3.el6.s390x", "product_id": "perf-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.6.3.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "product_id": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.6.3.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "product_id": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64", "product_id": "perf-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.6.3.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.6.3.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.src", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-11T18:45:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1723" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.6.3.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.6.3.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.6.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" } ] }
rhsa-2017_1715
Vulnerability from csaf_redhat
Published
2017-07-11 16:10
Modified
2024-11-14 23:35
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
Red Hat would like to thank Ari Kauppi for reporting this issue.
Bug Fix(es):
* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1466815)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\nRed Hat would like to thank Ari Kauppi for reporting this issue.\n\nBug Fix(es):\n\n* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1466815)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1715", "url": "https://access.redhat.com/errata/RHSA-2017:1715" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1715.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:35:28+00:00", "generator": { "date": "2024-11-14T23:35:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:1715", "initial_release_date": "2017-07-11T16:10:49+00:00", "revision_history": [ { "date": "2017-07-11T16:10:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-07-11T16:10:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:35:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.81.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.81.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.81.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.81.1.el6.x86_64", "product_id": "perf-0:2.6.32-358.81.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.81.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.81.1.el6.src", "product": { "name": "kernel-0:2.6.32-358.81.1.el6.src", "product_id": "kernel-0:2.6.32-358.81.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.81.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.81.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.81.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.81.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.81.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.81.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.81.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.81.1.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.81.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.81.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.81.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.81.1.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.81.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.81.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-07-11T16:10:49+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:1715" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.81.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.81.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.81.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" } ] }
rhsa-2017:2429
Vulnerability from csaf_redhat
Published
2017-08-08 11:00
Modified
2024-11-14 23:36
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
Red Hat would like to thank Ari Kauppi for reporting this issue.
Bug Fix(es):
* If a VFC port became unmapped in the VIOS, it sometimes did not respond with a CRQ init complete following the H_REG_CRQ() call. As a consequence, scsi_block_requests were called until the init complete occurred. If not, I/O requests were hung. The provided patch ensures the host action stays set to IBMVFC_HOST_ACTION_TGT_DEL so that all rports are moved into devloss state unless an init complete is received. (BZ#1460210)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\nRed Hat would like to thank Ari Kauppi for reporting this issue.\n\nBug Fix(es):\n\n* If a VFC port became unmapped in the VIOS, it sometimes did not respond with a CRQ init complete following the H_REG_CRQ() call. As a consequence, scsi_block_requests were called until the init complete occurred. If not, I/O requests were hung. The provided patch ensures the host action stays set to IBMVFC_HOST_ACTION_TGT_DEL so that all rports are moved into devloss state unless an init complete is received. (BZ#1460210)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2429", "url": "https://access.redhat.com/errata/RHSA-2017:2429" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2429.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:36:36+00:00", "generator": { "date": "2024-11-14T23:36:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2429", "initial_release_date": "2017-08-08T11:00:33+00:00", "revision_history": [ { "date": "2017-08-08T11:00:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-08T11:00:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:36:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.45.1.el6.x86_64", "product_id": "perf-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.45.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.45.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.45.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.45.1.el6.i686", "product_id": "python-perf-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.45.1.el6.i686", "product": { "name": "perf-0:2.6.32-573.45.1.el6.i686", "product_id": "perf-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.45.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.45.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.45.1.el6.src", "product": { "name": "kernel-0:2.6.32-573.45.1.el6.src", "product_id": "kernel-0:2.6.32-573.45.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.45.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.45.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.45.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.45.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.45.1.el6.s390x", "product_id": "python-perf-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "perf-0:2.6.32-573.45.1.el6.s390x", "product_id": "perf-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.45.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.45.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.45.1.el6.ppc64", "product_id": "perf-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.45.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.45.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-08T11:00:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:2429" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.45.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.45.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.45.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" } ] }
RHSA-2017:2472
Vulnerability from csaf_redhat
Published
2017-08-15 10:33
Modified
2024-11-14 23:36
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
Red Hat would like to thank Ari Kauppi for reporting this issue.
Bug Fix(es):
* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1472671)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\nRed Hat would like to thank Ari Kauppi for reporting this issue.\n\nBug Fix(es):\n\n* When upgrading to kernel with the fix for stack guard flaw, a crash could occur in Java Virtual Machine (JVM) environments, which attempted to implement their own stack guard page. With this update, the underlying source code has been fixed to consider the PROT_NONE mapping as a part of the stack, and the crash in JVM no longer occurs under the described circumstances. (BZ#1472671)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:2472", "url": "https://access.redhat.com/errata/RHSA-2017:2472" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2472.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:36:57+00:00", "generator": { "date": "2024-11-14T23:36:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:2472", "initial_release_date": "2017-08-15T10:33:46+00:00", "revision_history": [ { "date": "2017-08-15T10:33:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-08-15T10:33:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:36:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:5.9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.34.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.34.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.34.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.34.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.34.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-348.34.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-348.34.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.34.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.34.1.el5.src", "product": { "name": "kernel-0:2.6.18-348.34.1.el5.src", "product_id": "kernel-0:2.6.18-348.34.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.34.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-348.34.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-348.34.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-348.34.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.34.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.34.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.src" }, "product_reference": "kernel-0:2.6.18-348.34.1.el5.src", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-348.34.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.34.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-348.34.1.el5.noarch", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.34.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-348.34.1.el5.i386", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.34.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-08-15T10:33:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.34.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:2472" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.34.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.34.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.34.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" } ] }
RHSA-2017:1616
Vulnerability from csaf_redhat
Published
2017-06-28 16:57
Modified
2024-11-14 23:34
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)
* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)\n\n* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)\n\n* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1616", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "1452742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452742" }, { "category": "external", "summary": "1455239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455239" }, { "category": "external", "summary": "1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1616.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:34:54+00:00", "generator": { "date": "2024-11-14T23:34:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:1616", "initial_release_date": "2017-06-28T16:57:58+00:00", "revision_history": [ { "date": "2017-06-28T16:57:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T16:57:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:34:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-514.26.1.rt56.442.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_id": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-514.26.1.rt56.442.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-514.26.1.rt56.442.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Xiaohan Zhang" ], "organization": "Huawei Inc." } ], "cve": "CVE-2017-2583", "cwe": { "id": "CWE-250", "name": "Execution with Unnecessary Privileges" }, "discovery_date": "2017-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1414735" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7\nmay address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "RHBZ#1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-2583", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2583" } ], "release_date": "2017-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: Kvm: vmx/svm potential privilege escalation inside guest" }, { "cve": "CVE-2017-6214", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2017-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1426542" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "RHBZ#1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-6214", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6214" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-6214" } ], "release_date": "2017-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ipv4/tcp: Infinite loop in tcp_splice_read()" }, { "cve": "CVE-2017-7477", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2017-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1445207" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 starting with the version kernel-3.10.0-514.el7, that is with Red Hat Enterprise Linux 7.3 GA. Prior Red Hat Enterprise Linux 7 kernel versions are not affected.\n\nIn order to exploit this issue, the system needs to be manually configured by privileged user. The default Red Hat Enterprise Linux 7 configuration is not vulnerable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7477" }, { "category": "external", "summary": "RHBZ#1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7477", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7477" } ], "release_date": "2017-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "workaround", "details": "Red Hat recommends blacklisting the kernel module to prevent its use. This will prevent accidental version loading by administration and also mitigate the flaw if a kernel with the affected module is booted.\n\nAs the macsec module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nRaw\n\n # echo \"install macsec /bin/true\" \u003e\u003e /etc/modprobe.d/disable-macsec.conf \n\nIf macsec functionality is in use as a functional part of the system a kernel upgrade is required.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: net: Heap overflow in skb_to_sgvec in macsec.c" }, { "cve": "CVE-2017-7645", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1443615" } ], "notes": [ { "category": "description", "text": "The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd: Incorrect handling of long RPC replies", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with\nRed Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel\nupdates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may\naddress this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7645" }, { "category": "external", "summary": "RHBZ#1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7645", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7645" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7645" } ], "release_date": "2017-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfsd: Incorrect handling of long RPC replies" }, { "acknowledgments": [ { "names": [ "Ari Kauppi" ] } ], "cve": "CVE-2017-7895", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1446103" } ], "notes": [ { "category": "description", "text": "The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7895" }, { "category": "external", "summary": "RHBZ#1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7895" } ], "release_date": "2017-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests" }, { "acknowledgments": [ { "names": [ "Qualys Research Labs" ] } ], "cve": "CVE-2017-1000364", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1461333" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap/stack gap jumping via unbounded stack allocations", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "RHBZ#1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000364", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/stackguard", "url": "https://access.redhat.com/security/vulnerabilities/stackguard" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap/stack gap jumping via unbounded stack allocations" }, { "acknowledgments": [ { "names": [ "Qualys Inc" ] } ], "cve": "CVE-2017-1000379", "discovery_date": "2017-05-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1462165" } ], "notes": [ { "category": "description", "text": "The Linux Kernel running on AMD64 systems will sometimes map the contents of PIE executable, the heap or ld.so to where the stack is mapped allowing attackers to more easily manipulate the stack. Linux Kernel version 4.11.5 is affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrectly mapped contents of PIE executable", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue was part of the stack guard fixes that was fixed along side the CVE-2017-1000364 flaw. This issue has previously affected Red Hat Enterprise Linux 5,6,7 and MRG-2. This issue is currently fixed in most versions of shipping products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000379" }, { "category": "external", "summary": "RHBZ#1462165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1462165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000379", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000379" }, { "category": "external", "summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt", "url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" } ], "release_date": "2017-06-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-06-28T16:57:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2017:1616" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-NFV-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-NFV-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-NFV-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.src", "7Server-RT-7.3.Z:kernel-rt-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-doc-0:3.10.0-514.26.1.rt56.442.el7.noarch", "7Server-RT-7.3.Z:kernel-rt-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-devel-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-0:3.10.0-514.26.1.rt56.442.el7.x86_64", "7Server-RT-7.3.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.26.1.rt56.442.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Incorrectly mapped contents of PIE executable" } ] }
rhsa-2017_1616
Vulnerability from csaf_redhat
Published
2017-06-28 16:57
Modified
2024-11-14 23:34
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)->frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)
* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)
Red Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.
Bug Fix(es):
* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)
* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)\n\n* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-\u003efrag_list) in the socket buffer(skb_buff). The heap overflow occurred if \u0027MAX_SKB_FRAGS + 1\u0027 parameter and \u0027NETIF_F_FRAGLIST\u0027 feature are both used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important)\n\n* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel, resulting in denial of service. (CVE-2017-7645, Important)\n\n* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important)\n\n* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate)\n\n* A flaw was found in the Linux kernel\u0027s handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364; Ari Kauppi for reporting CVE-2017-7895; and Xiaohan Zhang (Huawei Inc.) for reporting CVE-2017-2583.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-514.25.2 source tree, which provides a number of bug fixes over the previous version. (BZ#1452742)\n\n* Previously, a local lock acquisition around the ip_send_unicast_reply() function was incorrectly terminated. Consequently, a list corruption occurred that led to a kernel panic. This update adds locking functions around calls to ip_send_unicast_reply(). As a result, neither list corruption nor kernel panic occur under the described circumstances. (BZ#1455239)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:1616", "url": "https://access.redhat.com/errata/RHSA-2017:1616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1414735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1414735" }, { "category": "external", "summary": "1426542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1426542" }, { "category": "external", "summary": "1443615", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1443615" }, { "category": "external", "summary": "1445207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1445207" }, { "category": "external", "summary": "1446103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446103" }, { "category": "external", "summary": "1452742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452742" }, { "category": "external", "summary": "1455239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1455239" }, { "category": "external", "summary": "1461333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1616.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:34:54+00:00", "generator": { "date": "2024-11-14T23:34:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2017:1616", "initial_release_date": "2017-06-28T16:57:58+00:00", "revision_history": [ { "date": "2017-06-28T16:57:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-06-28T16:57:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:34:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.3.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": {